cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
670
Views
0
Helpful
0
Comments
timshores
Cisco Employee
Cisco Employee

Hello everyone! Here are the release notes for our most recent updates to Duo.

Public release notes are published on the Customer Community every other Friday, the day after the D-release is completely rolled out. You can subscribe to notifications for new release notes by following the process described here. If you have any questions about these changes, please comment below.

Check out the Guide to Duo End-of-Life and End-of-Support Plans. This guide provides an up-to-date list of current and past end-of-life plans for Duo products. 

 

What's in this release? 

 

 

New features, enhancements, and other improvements

Now in public preview: Duo Trust Monitor security event notifications

 

timshores_0-1695998317355.png

 

Removal of passcodes from Duo Risk-Based Factor Selection methods

  • Duo’s Risk-Based Factor Selection (RBFS) policy will no longer allow passcodes via SMS, Duo Mobile, and hardware token as RBFS step-up authentication methods.
  • The change will affect end-users logging into applications protected by RBFS policy. When RBFS detects a risk pattern and requires a step-up authentication from an end-user, the end-user will not be able to use passcode methods to complete the step-up authentication until the end-user completes MFA with a more secure method. 
  • Going forward, RBFS step-up authentication will offer the following methods:

WebAuthn FIDO2 security keys with biometric or PIN verification

Platform authenticators like Touch ID or Windows Hello 

Verified Duo Push

Bypass codes provided by a Duo administrator

  • This change will not apply to the Auth API.

 

Why has Duo removed passcodes as a RBFS step-up authentication method? 

This change will improve Duo protection from passcode phishing. 

As our customers’ trusted advisor in secure access, we are committed to developing Risk-Based Authentication policies that provide the strongest protection possible in response to high-risk authentication patterns. 

We have learned from our research that passcodes no longer give our customers the protection they need from high-risk threats. By collaborating with customers on the research of threat actor capabilities, Duo has verified that attackers are increasingly targeting passcodes to gain access to protected applications. 



Operating systems policy updated

  • iOS 17 and macOS 14 Sonoma are now available in operating systems policy.
  • Duo operating systems policy will now recognize iOS 17 as the latest, and iOS 16 as up-to-date.
  • On September 21, 2023, Apple released critical security updates to iOS 17 and iOS 16, but not iOS 15. Therefore, Duo will now recognize iOS 15 as end-of-life.
  • Duo operating systems policy will now recognize macOS 14 Sonoma as the latest, and macOS 13 Ventura as up-to-date.


New Devices Policy timing options for warning and blocking users with out of date operating systems, browsers, and plugins

  • Operating systems policy now lets you select 3 days or 7 days from the dropdown lists for When a version becomes out of date or end of life, encourage to update and When a version becomes out of date or end of life, encourage to block.
  • Browsers policy: When you choose to Warn users if their browser is out of date, you may now select 3 days or 1 week from the dropdown list for And block them if it's more than [   ] out of date.
  • Plugins policy: When you choose to Warn users when their Java plugin is out of date, you may now select 3 days or 1 week from the dropdown list for And block them if it's more than [   ] out of date
  • These policies are available in Duo Advantage and Duo Premier.


Update to the Duo MSP Console




New and updated applications

Duo Authentication Proxy version 6.1.0 released

  • Restores the default for allow_concat to false in the radius_server_eap section.
  • Fixes various bugs in radius_server_eap functionality.
  • No longer logs configured server sections twice at startup.
  • Authentication Proxy upgrades no longer fail when there is a subdirectory inside the conf directory.
  • The Windows service now correctly installs/uninstalls when there is an invalid authproxy.cfg (ZTAT-27)
  • Provides a utility script to assist with converting radius_server_iframe sections to radius_server_auto. See Guide to Duo's iFrame Reconfiguration Script.
  • Updates Cryptography to 41.0.3.
  • Updates OpenSSL to 3.1.2.

 

Three new named SAML applications with Duo SSO and two SSO updates

 

Duo Device Health application public beta versions 5.4.2 and 5.4.3 released

 

Duo Mobile for Android version 4.50.0 released

  • Miscellaneous bug fixes and behind-the-scenes improvements.

 

Duo Mobile for iOS version 4.50.0 released

  • Miscellaneous bug fixes and behind-the-scenes improvements.



Bug fixes

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Quick Links