Skip to content

Commit e9c51f6

Browse files
authored
fix (#91)
* fix * final touch
1 parent 94d0529 commit e9c51f6

File tree

5 files changed

+39
-39
lines changed

5 files changed

+39
-39
lines changed

public/images/blog/main-release-notes/activity-log-screen.png renamed to public/images/blog/defguard-1.5-release-notes/activity-log-screen.png

File renamed without changes.

public/images/blog/main-release-notes/mfa-method.png renamed to public/images/blog/defguard-1.5-release-notes/mfa-method.png

File renamed without changes.

public/images/blog/main-release-notes/profile-screen.png renamed to public/images/blog/defguard-1.5-release-notes/profile-screen.png

File renamed without changes.

public/images/blog/main-release-notes/version-mismatch.avif renamed to public/images/blog/defguard-1.5-release-notes/version-mismatch.avif

File renamed without changes.

src/content/blog/main-release-notes.mdx renamed to src/content/blog/defguard-1.5-release-notes.mdx

Lines changed: 39 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Main Release Notes
2+
title: Release 1.5 with Mobile apps, External SSO MFA, MFA with Biometry
33
publishDate: 2025-09-10
44
description: Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse molestie, ex vitae auctor pretium, orci est convallis ipsum, non rhoncus mi dolor nec metus.
55
draft: true
@@ -12,25 +12,25 @@ import YouTubeVideo from "../../components/video/YouTubeVideo.astro";
1212
This is the biggest, most feature packed (and fixes) release we have ever done!
1313
We’ve introduced 11 major features ! and nearly 100 bugfixes. Most important are:
1414

15-
- 📲 Long awaited Mobile Clients (supporting [External Multi-Factor Authentication](https://docs.defguard.net/1.5/features/wireguard/multi-factor-authentication-mfa-2fa/external-sso-based-mfa) and [Internal Multi-Factor Authentication](https://docs.defguard.net/1.5/features/wireguard/multi-factor-authentication-mfa-2fa/internal-sso-based-mfa)) are here!
15+
- 📲 Long awaited Mobile Clients (supporting <a href="https://docs.defguard.net/1.5/features/wireguard/multi-factor-authentication-mfa-2fa/external-sso-based-mfa" target="_blank">External Multi-Factor Authentication</a> and <a href="https://docs.defguard.net/1.5/features/wireguard/multi-factor-authentication-mfa-2fa/internal-sso-based-mfa" target="_blank">Internal Multi-Factor Authentication</a>) are here!
1616

17-
- 💫 Desktop Client now supports [External SSO/IdP MFA](https://docs.defguard.net/1.5/using-defguard-for-end-users/desktop-client/using-multi-factor-authentication-mfa#external-mfa)
17+
- 💫 Desktop Client now supports <a href="https://docs.defguard.net/1.5/using-defguard-for-end-users/desktop-client/using-multi-factor-authentication-mfa#external-mfa" target="_blank">External SSO/IdP MFA</a>
1818

1919
- 🫆 Our **innovation**: [**Multi-Factor Authentication on Desktop Client using Mobile client’s Biometry!**](https://docs.defguard.net/1.5/using-defguard-for-end-users/desktop-client/using-multi-factor-authentication-mfa#internal-mfa)
2020

21-
- 🤝 Being a **completely open company**, we’ve introduced a number of public processes like the [Architecture Decision Records](https://docs.defguard.net/in-depth/architecture-decision-records) and the [public pentesting discoveries and fixes page](https://defguard.net/pentesting) prepared with our [security team](https://isec.pl) ] (as far as we know, we are the only VPN solution to do so).
21+
- 🤝 Being a **completely open company**, we’ve introduced a number of public processes like the <a href="https://docs.defguard.net/in-depth/architecture-decision-records" target="_blank">Architecture Decision Records</a> and the <a href="https://defguard.net/pentesting" target="_blank">public pentesting discoveries and fixes page</a> prepared with our <a href="https://isec.pl" target="_blank">security team</a> (as far as we know, we are the only VPN solution to do so).
2222

23-
- 🚩 We’ve also explained in detail, why [**most WireGuard®-based solutions claiming to have MFA are highly misleading and potentially harmful to user security**](https://docs.defguard.net/1.5/features/wireguard/multi-factor-authentication-mfa-2fa).
23+
- 🚩 We’ve also explained in detail, why <a href="https://docs.defguard.net/1.5/features/wireguard/multi-factor-authentication-mfa-2fa" target="_blank">**most WireGuard®-based solutions claiming to have MFA are highly misleading and potentially harmful to user security**</a>.
2424

2525
All and more in details below! Hope you will enjoy the read as much as we enjoyed delivering the 1.5!
2626

27-
Please [star us on GitHub](https://github.com/defguard/defguard/) 🙏🫡
27+
Please <a href="https://github.com/defguard/defguard/" target="_blank">star us on GitHub</a> 🙏🫡
2828

29-
# Key improvements released in Defguard 1.5
29+
# Defguard 1.5: A Disruptive Leap Forward
3030

3131
## Mobile Clients (iOS/Android)
3232

33-
Grab them from [App Store](tu_link) and [Play Store](https://play.google.com/store/apps/details?id=net.defguard.mobile). They support all our major features like:
33+
Grab them from <a href="tu_link" target="_blank">App Store</a> and <a href="https://play.google.com/store/apps/details?id=net.defguard.mobile" target="_blank">Play Store</a>. They support all our major features like:
3434

3535
- Multi-Factor Authentication with Biometry (new), TOTP/Email codes (for Internal MFA) as well as External SSO MFA (when using Google/Okta/Microsoft/JumpCloud or other)
3636
- Real time configuration updates
@@ -48,11 +48,11 @@ Here you can see all this in action:
4848
rel={false}
4949
/>
5050

51-
## Multi-Factor Authentication with Mobile Biometry on Desktop
51+
## VPN Multi-Factor Authentication with Mobile Biometry on Desktop
5252

5353
After configuring VPN on your mobile device and enabling Biometry, we not only enable Biometry based connecting on a mobile device, but add an extra security layer to have the most secure/sophisticated MFA method available for Desktop (as they are more susceptible to attacks). After enabling Biometry we create an additional private/public key pair, with the private key stored on the OS backend secure storage, and inform in the UI, that this device now can be used for MFA using Biometry on a desktop client:
5454

55-
![](/images/blog/main-release-notes/profile-screen.png)
55+
![](/images/blog/defguard-1.5-release-notes/profile-screen.png)
5656

5757
Now, when you connect on the desktop client to a location that has Internal MFA configured, you can choose “Mobile App” for MFA. A QR code will be shown that has to be scanned on the mobile device for additional MFA steps:
5858
1) Biometry authentication that enables access to device secure storage
@@ -69,8 +69,9 @@ Here you can see it in action:
6969
rel={false}
7070
/>
7171

72-
73-
## Still not using Defguard, try it with our with [one-line deployment!](https://docs.defguard.net/getting-started/one-line-install)
72+
#
73+
# Still not using Defguard, try it with our with <a href="https://docs.defguard.net/getting-started/one-line-install" target="_blank">one-line deployment!</a>
74+
#
7475

7576

7677
## Multi-Factor Authentication with External SSO/IdPs
@@ -81,7 +82,7 @@ From 1.5 when an External SSO/IdP is configured in Defguard on each location you
8182
- Internal MFA - connecting to this location will require Mobile Biometry, TOTP or Email codes
8283
- External MFA - each connection will require to authenticate in the External SSO that is configured
8384

84-
![](/images/blog/main-release-notes/mfa-method.png)
85+
![](/images/blog/defguard-1.5-release-notes/mfa-method.png)
8586

8687
See it in action here:
8788

@@ -102,16 +103,16 @@ Defguard is a critical component of an infrastructure, enabling secure access -
102103

103104
With this in mind, for this release we’ve created the foundation for that, where all our components exchange detailed version information and log them in each communication instance:
104105

105-
![](/images/blog/main-release-notes/activity-log-screen.png)
106+
![](/images/blog/defguard-1.5-release-notes/activity-log-screen.png)
106107

107108
This mechanism will be used in future releases, to provide automated upgrades but also detailed information for admin/operators (like what is the Users Desktop/Mobile client version - to inform about upgrade, etc.).
108109

109-
The first functionality we’re introducing based on this is information about [unsupported component versions](https://docs.defguard.net/1.5/deployment-strategies/setting-up-your-instance#updates) - if they are detected:
110+
The first functionality we’re introducing based on this is information about <a href="https://docs.defguard.net/1.5/deployment-strategies/setting-up-your-instance#updates" target="_blank">unsupported component versions</a> - if they are detected:
110111

111-
![](/images/blog/main-release-notes/version-mismatch.avif)
112+
![](/images/blog/defguard-1.5-release-notes/version-mismatch.avif)
112113

113114

114-
# Desktop Client based on Tauri v2
115+
## Desktop Client based on Tauri v2
115116

116117
Tauri is a great framework for building fast, secure, cross-platform applications. We’ve used Tauri v1 up to this point, which had a lot of issues and limited us with some features/bugfixes that many of you reported. Tauri v2 is stable now and we could upgrade, enabling a lot changes like:
117118

@@ -120,7 +121,7 @@ Tauri is a great framework for building fast, secure, cross-platform application
120121
- ….
121122

122123

123-
# Desktop Client seamless enrollment with a button click
124+
## Desktop Client seamless enrollment with a button click
124125

125126
Tauri v2 finally enabled us to deliver the quickest way to configure a desktop client, with just one click, see it in action:
126127

@@ -134,66 +135,65 @@ Tauri v2 finally enabled us to deliver the quickest way to configure a desktop c
134135
rel={false}
135136
/>
136137

137-
# Setting up MFA in Desktop Client during enrollment
138+
## Setting up MFA in Desktop Client during enrollment
138139

139140
From early releases we’ve introduced a secure remote enrollment process, where users in their Desktop Client could set up their password and configure the client.
140141

141142
But one critical feature that was missing, is setting up any MFA method during enrollment. Consequently, if the VPN location defined by the admin required MFA - that was a major obstacle - as the user needs to have access to defguard (eg. from the office on-site) to configure MFA in the profile.
142143

143144
Now, if there is any location using Internal MFA, user is required during enrollment to configure MFA. See it here:
144145

145-
# JumpCloud Directory Sync
146+
## JumpCloud Directory Sync
146147

147-
We already supported directory sync for Google, Microsoft and Okta. Now we also support JumpCloud - see more details [here](https://docs.defguard.net/features/external-openid-providers/jumpcloud)
148+
We already supported directory sync for Google, Microsoft and Okta. Now we also support JumpCloud - see more details <a href="https://docs.defguard.net/features/external-openid-providers/jumpcloud" target="_blank">here</a>
148149

149-
# Possibility for admins to reset users MFA
150+
## Possibility for admins to reset users MFA
150151

151-
Now admins can go to user's profile and disable their MFA (check our [documentation](https://docs.defguard.net/1.5/support-1/troubleshooting#user-lost-access-to-their-2fa-methods))
152+
Now admins can go to user's profile and disable their MFA (check our <a href="https://docs.defguard.net/1.5/support-1/troubleshooting#user-lost-access-to-their-2fa-methods" target="_blank">documentation</a>)
152153

153-
# Display event metadata in Activity Log
154+
## Display event metadata in Activity Log
154155

155156
Activity stream now has two additional columns:
156157

157158
- Location - indicating what VPN Location this event corresponds to
158159
- Description - with more detailed description of the event
159160

160-
# Implement SNAT binding to specific IP for a specific user
161+
## Implement SNAT binding to specific IP for a specific user
161162

162-
User SNAT bindings allow administrators to assign specific public IP addresses to users for outbound traffic from Defguard VPN gateways in a given location. This provides fine-grained control over how user traffic appears to external networks. More details in [documentation here](https://docs.defguard.net/1.5/features/user-snat-bindings).
163+
User SNAT bindings allow administrators to assign specific public IP addresses to users for outbound traffic from Defguard VPN gateways in a given location. This provides fine-grained control over how user traffic appears to external networks. More details in <a href="https://docs.defguard.net/1.5/features/user-snat-bindings" target="_blank">documentation here</a>.
163164

164-
# Key transparency improvements
165+
# Key transparency improvements
165166

166167
Our roadmap, development backlog and documentation was always open, now we bring new transparency standards:
167168

168-
- [Public pentesting page](https://defguard.net/pentesting) - we’ve published PDF reports of our pentesting process before, but we always got a lot of questions - *was the issue fixed? Where?* Now you can see it in detail [on an interactive pentesting page](https://defguard.net/pentesting).
169-
- Architecture Decision Records - concise documents that capture important architectural decisions we make during the lifecycle of Defguard’s development - find them [here](https://docs.defguard.net/1.5/in-depth/architecture-decision-records)
170-
- We’ve introduced our [Security Approach page](https://defguard.net/security), and [Vulnerability Disclosure Policy](https://defguard.net/security#VDP-title)
169+
- <a href="https://defguard.net/pentesting" target="_blank">Public pentesting page</a> - we’ve published PDF reports of our pentesting process before, but we always got a lot of questions - *was the issue fixed? Where?* Now you can see it in detail <a href="https://defguard.net/pentesting" target="_blank">on an interactive pentesting page</a>.
170+
- Architecture Decision Records - concise documents that capture important architectural decisions we make during the lifecycle of Defguard’s development - find them <a href="https://docs.defguard.net/1.5/in-depth/architecture-decision-records" target="_blank">here</a>
171+
- We’ve introduced our <a href="https://defguard.net/security" target="_blank">Security Approach page</a>, and <a href="https://defguard.net/security#VDP-title" target="_blank">Vulnerability Disclosure Policy</a>
171172

172-
# What upcoming releases will bring
173+
# What upcoming releases will bring
173174

174-
Please remember, that our Enterprise customers have a huge influence on the roadmap and features that will be implemented ! Please [consider supporting us](https://defguard.net/pricing)!
175+
Please remember, that our Enterprise customers have a huge influence on the roadmap and features that will be implemented ! Please <a href="https://defguard.net/pricing" target="_blank">consider supporting us</a>!
175176

176-
# Amazon Machine Images
177+
## Amazon Machine Images
177178

178179
We’ve already have them prepared, just need to bring them to Amazon Marketplace.
179180

180-
# Hardware Keys based MFA in desktop client (and data encryption)
181+
## Hardware Keys based MFA in desktop client (and data encryption)
181182

182183
We know that submitting tokens (totp/email) or (much smoother but still pain in the ***) QR code scan+biometry for each connection can be annoying. That’s why we would like to introduce Hardware Keys provisioning in the desktop client (so it will be done securely on users device), which will enable:
183184
1) to encrypt all Desktop Client’s data and make them inaccessible (yes, all! not only the WireGuard keys) without the HW key
184185
2) MFA using the HW key - for easy connection…
185186

186-
Please discuss this here: https://github.com/DefGuard/client/issues/431
187+
Please discuss this here: <a href="https://github.com/DefGuard/client/issues/431" target="_blank">https://github.com/DefGuard/client/issues/431</a>
187188

188-
# UI (and UX) of all apps
189+
## UI (and UX) of all apps
189190

190191
We are aware of the shortcomings of the current UI and UX in all our apps. Over the years, as the system evolved, certain features were designed in ways that no longer meet current needs.
191192

192193
Because of this from the next release (1.6) we are starting to work on the new UI and then new UX successively in all components and applications - as this in our opinion is the most important next step.
193194

194195
The plan is to introduce a new UI (and some UX improvements) in the Enrollment (proxy) and Defguard Core, hopefully in 1.6 release. After that we will work on Mobile and then Desktop apps (also bringing a simplified desktop app for less experienced users).
195196

196-
# New MFA connect & re-authenticate approach
197-
198-
For more details and discussion go here: [https://github.com/DefGuard/defguard/issues/1359](https://github.com/DefGuard/defguard/issues/1359)
197+
## New MFA connect & re-authenticate approach
199198

199+
For more details and discussion go here: <a href="https://github.com/DefGuard/defguard/issues/1359" target="_blank">https://github.com/DefGuard/defguard/issues/1359</a>

0 commit comments

Comments
 (0)