You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/blog/defguard-1.5-release-notes.mdx
+39-39Lines changed: 39 additions & 39 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Main Release Notes
2
+
title: Release 1.5 with Mobile apps, External SSO MFA, MFA with Biometry
3
3
publishDate: 2025-09-10
4
4
description: Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse molestie, ex vitae auctor pretium, orci est convallis ipsum, non rhoncus mi dolor nec metus.
5
5
draft: true
@@ -12,25 +12,25 @@ import YouTubeVideo from "../../components/video/YouTubeVideo.astro";
12
12
This is the biggest, most feature packed (and fixes) release we have ever done!
13
13
We’ve introduced 11 major features ! and nearly 100 bugfixes. Most important are:
14
14
15
-
- 📲 Long awaited Mobile Clients (supporting [External Multi-Factor Authentication](https://docs.defguard.net/1.5/features/wireguard/multi-factor-authentication-mfa-2fa/external-sso-based-mfa) and [Internal Multi-Factor Authentication](https://docs.defguard.net/1.5/features/wireguard/multi-factor-authentication-mfa-2fa/internal-sso-based-mfa)) are here!
15
+
- 📲 Long awaited Mobile Clients (supporting <ahref="https://docs.defguard.net/1.5/features/wireguard/multi-factor-authentication-mfa-2fa/external-sso-based-mfa"target="_blank">External Multi-Factor Authentication</a> and <ahref="https://docs.defguard.net/1.5/features/wireguard/multi-factor-authentication-mfa-2fa/internal-sso-based-mfa"target="_blank">Internal Multi-Factor Authentication</a>) are here!
16
16
17
-
- 💫 Desktop Client now supports [External SSO/IdP MFA](https://docs.defguard.net/1.5/using-defguard-for-end-users/desktop-client/using-multi-factor-authentication-mfa#external-mfa)
17
+
- 💫 Desktop Client now supports <ahref="https://docs.defguard.net/1.5/using-defguard-for-end-users/desktop-client/using-multi-factor-authentication-mfa#external-mfa"target="_blank">External SSO/IdP MFA</a>
18
18
19
19
- Our **innovation**: [**Multi-Factor Authentication on Desktop Client using Mobile client’s Biometry!**](https://docs.defguard.net/1.5/using-defguard-for-end-users/desktop-client/using-multi-factor-authentication-mfa#internal-mfa)
20
20
21
-
- 🤝 Being a **completely open company**, we’ve introduced a number of public processes like the [Architecture Decision Records](https://docs.defguard.net/in-depth/architecture-decision-records)and the [public pentesting discoveries and fixes page](https://defguard.net/pentesting) prepared with our [security team](https://isec.pl)] (as far as we know, we are the only VPN solution to do so).
21
+
- 🤝 Being a **completely open company**, we’ve introduced a number of public processes like the <ahref="https://docs.defguard.net/in-depth/architecture-decision-records"target="_blank">Architecture Decision Records</a> and the <ahref="https://defguard.net/pentesting"target="_blank">public pentesting discoveries and fixes page</a> prepared with our <ahref="https://isec.pl"target="_blank">security team</a> (as far as we know, we are the only VPN solution to do so).
22
22
23
-
- 🚩 We’ve also explained in detail, why [**most WireGuard®-based solutions claiming to have MFA are highly misleading and potentially harmful to user security**](https://docs.defguard.net/1.5/features/wireguard/multi-factor-authentication-mfa-2fa).
23
+
- 🚩 We’ve also explained in detail, why <ahref="https://docs.defguard.net/1.5/features/wireguard/multi-factor-authentication-mfa-2fa"target="_blank">**most WireGuard®-based solutions claiming to have MFA are highly misleading and potentially harmful to user security**</a>.
24
24
25
25
All and more in details below! Hope you will enjoy the read as much as we enjoyed delivering the 1.5!
26
26
27
-
Please [star us on GitHub](https://github.com/defguard/defguard/) 🙏🫡
27
+
Please <ahref="https://github.com/defguard/defguard/"target="_blank">star us on GitHub</a> 🙏🫡
28
28
29
-
# Key improvements released in Defguard 1.5
29
+
# Defguard 1.5: A Disruptive Leap Forward
30
30
31
31
## Mobile Clients (iOS/Android)
32
32
33
-
Grab them from [App Store](tu_link) and [Play Store](https://play.google.com/store/apps/details?id=net.defguard.mobile). They support all our major features like:
33
+
Grab them from <ahref="tu_link"target="_blank">App Store</a> and <ahref="https://play.google.com/store/apps/details?id=net.defguard.mobile"target="_blank">Play Store</a>. They support all our major features like:
34
34
35
35
- Multi-Factor Authentication with Biometry (new), TOTP/Email codes (for Internal MFA) as well as External SSO MFA (when using Google/Okta/Microsoft/JumpCloud or other)
36
36
- Real time configuration updates
@@ -48,11 +48,11 @@ Here you can see all this in action:
48
48
rel={false}
49
49
/>
50
50
51
-
## Multi-Factor Authentication with Mobile Biometry on Desktop
51
+
## VPN Multi-Factor Authentication with Mobile Biometry on Desktop
52
52
53
53
After configuring VPN on your mobile device and enabling Biometry, we not only enable Biometry based connecting on a mobile device, but add an extra security layer to have the most secure/sophisticated MFA method available for Desktop (as they are more susceptible to attacks). After enabling Biometry we create an additional private/public key pair, with the private key stored on the OS backend secure storage, and inform in the UI, that this device now can be used for MFA using Biometry on a desktop client:
Now, when you connect on the desktop client to a location that has Internal MFA configured, you can choose “Mobile App” for MFA. A QR code will be shown that has to be scanned on the mobile device for additional MFA steps:
58
58
1) Biometry authentication that enables access to device secure storage
@@ -69,8 +69,9 @@ Here you can see it in action:
69
69
rel={false}
70
70
/>
71
71
72
-
73
-
## Still not using Defguard, try it with our with [one-line deployment!](https://docs.defguard.net/getting-started/one-line-install)
72
+
#
73
+
# Still not using Defguard, try it with our with <ahref="https://docs.defguard.net/getting-started/one-line-install"target="_blank">one-line deployment!</a>
74
+
#
74
75
75
76
76
77
## Multi-Factor Authentication with External SSO/IdPs
@@ -81,7 +82,7 @@ From 1.5 when an External SSO/IdP is configured in Defguard on each location you
81
82
- Internal MFA - connecting to this location will require Mobile Biometry, TOTP or Email codes
82
83
- External MFA - each connection will require to authenticate in the External SSO that is configured
@@ -102,16 +103,16 @@ Defguard is a critical component of an infrastructure, enabling secure access -
102
103
103
104
With this in mind, for this release we’ve created the foundation for that, where all our components exchange detailed version information and log them in each communication instance:
This mechanism will be used in future releases, to provide automated upgrades but also detailed information for admin/operators (like what is the Users Desktop/Mobile client version - to inform about upgrade, etc.).
108
109
109
-
The first functionality we’re introducing based on this is information about [unsupported component versions](https://docs.defguard.net/1.5/deployment-strategies/setting-up-your-instance#updates) - if they are detected:
110
+
The first functionality we’re introducing based on this is information about <ahref="https://docs.defguard.net/1.5/deployment-strategies/setting-up-your-instance#updates"target="_blank">unsupported component versions</a> - if they are detected:
Tauri is a great framework for building fast, secure, cross-platform applications. We’ve used Tauri v1 up to this point, which had a lot of issues and limited us with some features/bugfixes that many of you reported. Tauri v2 is stable now and we could upgrade, enabling a lot changes like:
117
118
@@ -120,7 +121,7 @@ Tauri is a great framework for building fast, secure, cross-platform application
120
121
- ….
121
122
122
123
123
-
# Desktop Client seamless enrollment with a button click
124
+
##Desktop Client seamless enrollment with a button click
124
125
125
126
Tauri v2 finally enabled us to deliver the quickest way to configure a desktop client, with just one click, see it in action:
126
127
@@ -134,66 +135,65 @@ Tauri v2 finally enabled us to deliver the quickest way to configure a desktop c
134
135
rel={false}
135
136
/>
136
137
137
-
# Setting up MFA in Desktop Client during enrollment
138
+
##Setting up MFA in Desktop Client during enrollment
138
139
139
140
From early releases we’ve introduced a secure remote enrollment process, where users in their Desktop Client could set up their password and configure the client.
140
141
141
142
But one critical feature that was missing, is setting up any MFA method during enrollment. Consequently, if the VPN location defined by the admin required MFA - that was a major obstacle - as the user needs to have access to defguard (eg. from the office on-site) to configure MFA in the profile.
142
143
143
144
Now, if there is any location using Internal MFA, user is required during enrollment to configure MFA. See it here:
144
145
145
-
# JumpCloud Directory Sync
146
+
##JumpCloud Directory Sync
146
147
147
-
We already supported directory sync for Google, Microsoft and Okta. Now we also support JumpCloud - see more details [here](https://docs.defguard.net/features/external-openid-providers/jumpcloud)
148
+
We already supported directory sync for Google, Microsoft and Okta. Now we also support JumpCloud - see more details <ahref="https://docs.defguard.net/features/external-openid-providers/jumpcloud"target="_blank">here</a>
148
149
149
-
# Possibility for admins to reset users MFA
150
+
##Possibility for admins to reset users MFA
150
151
151
-
Now admins can go to user's profile and disable their MFA (check our [documentation](https://docs.defguard.net/1.5/support-1/troubleshooting#user-lost-access-to-their-2fa-methods))
152
+
Now admins can go to user's profile and disable their MFA (check our <ahref="https://docs.defguard.net/1.5/support-1/troubleshooting#user-lost-access-to-their-2fa-methods"target="_blank">documentation</a>)
152
153
153
-
# Display event metadata in Activity Log
154
+
##Display event metadata in Activity Log
154
155
155
156
Activity stream now has two additional columns:
156
157
157
158
- Location - indicating what VPN Location this event corresponds to
158
159
- Description - with more detailed description of the event
159
160
160
-
# Implement SNAT binding to specific IP for a specific user
161
+
##Implement SNAT binding to specific IP for a specific user
161
162
162
-
User SNAT bindings allow administrators to assign specific public IP addresses to users for outbound traffic from Defguard VPN gateways in a given location. This provides fine-grained control over how user traffic appears to external networks. More details in [documentation here](https://docs.defguard.net/1.5/features/user-snat-bindings).
163
+
User SNAT bindings allow administrators to assign specific public IP addresses to users for outbound traffic from Defguard VPN gateways in a given location. This provides fine-grained control over how user traffic appears to external networks. More details in <ahref="https://docs.defguard.net/1.5/features/user-snat-bindings"target="_blank">documentation here</a>.
163
164
164
-
# Key transparency improvements
165
+
# Key transparency improvements
165
166
166
167
Our roadmap, development backlog and documentation was always open, now we bring new transparency standards:
167
168
168
-
-[Public pentesting page](https://defguard.net/pentesting)- we’ve published PDF reports of our pentesting process before, but we always got a lot of questions - *was the issue fixed? Where?* Now you can see it in detail [on an interactive pentesting page](https://defguard.net/pentesting).
169
-
- Architecture Decision Records - concise documents that capture important architectural decisions we make during the lifecycle of Defguard’s development - find them [here](https://docs.defguard.net/1.5/in-depth/architecture-decision-records)
-<ahref="https://defguard.net/pentesting"target="_blank">Public pentesting page</a> - we’ve published PDF reports of our pentesting process before, but we always got a lot of questions - *was the issue fixed? Where?* Now you can see it in detail <ahref="https://defguard.net/pentesting"target="_blank">on an interactive pentesting page</a>.
170
+
- Architecture Decision Records - concise documents that capture important architectural decisions we make during the lifecycle of Defguard’s development - find them <ahref="https://docs.defguard.net/1.5/in-depth/architecture-decision-records"target="_blank">here</a>
Please remember, that our Enterprise customers have a huge influence on the roadmap and features that will be implemented ! Please [consider supporting us](https://defguard.net/pricing)!
175
+
Please remember, that our Enterprise customers have a huge influence on the roadmap and features that will be implemented ! Please <ahref="https://defguard.net/pricing"target="_blank">consider supporting us</a>!
175
176
176
-
# Amazon Machine Images
177
+
##Amazon Machine Images
177
178
178
179
We’ve already have them prepared, just need to bring them to Amazon Marketplace.
179
180
180
-
# Hardware Keys based MFA in desktop client (and data encryption)
181
+
##Hardware Keys based MFA in desktop client (and data encryption)
181
182
182
183
We know that submitting tokens (totp/email) or (much smoother but still pain in the ***) QR code scan+biometry for each connection can be annoying. That’s why we would like to introduce Hardware Keys provisioning in the desktop client (so it will be done securely on users device), which will enable:
183
184
1) to encrypt all Desktop Client’s data and make them inaccessible (yes, all! not only the WireGuard keys) without the HW key
184
185
2) MFA using the HW key - for easy connection…
185
186
186
-
Please discuss this here: https://github.com/DefGuard/client/issues/431
187
+
Please discuss this here: <ahref="https://github.com/DefGuard/client/issues/431"target="_blank">https://github.com/DefGuard/client/issues/431</a>
187
188
188
-
# UI (and UX) of all apps
189
+
##UI (and UX) of all apps
189
190
190
191
We are aware of the shortcomings of the current UI and UX in all our apps. Over the years, as the system evolved, certain features were designed in ways that no longer meet current needs.
191
192
192
193
Because of this from the next release (1.6) we are starting to work on the new UI and then new UX successively in all components and applications - as this in our opinion is the most important next step.
193
194
194
195
The plan is to introduce a new UI (and some UX improvements) in the Enrollment (proxy) and Defguard Core, hopefully in 1.6 release. After that we will work on Mobile and then Desktop apps (also bringing a simplified desktop app for less experienced users).
195
196
196
-
# New MFA connect & re-authenticate approach
197
-
198
-
For more details and discussion go here: [https://github.com/DefGuard/defguard/issues/1359](https://github.com/DefGuard/defguard/issues/1359)
197
+
## New MFA connect & re-authenticate approach
199
198
199
+
For more details and discussion go here: <ahref="https://github.com/DefGuard/defguard/issues/1359"target="_blank">https://github.com/DefGuard/defguard/issues/1359</a>
0 commit comments