Release Notes

Release 4.9.3

  • Updated the MSI installer to ensure the ServiceURL points to the desired endpoint.

  • Updated the MSI installer to ensure the ServiceURL points to the desired endpoint.

  • Added ChromeChannel.exe, and the corresponding registry files, to the installation process to enhance the functionality of secured applications.

  • The client installer now checks for the .NET framework and prompts the user to install it if it is missing.

  • When the client is configured to run in Server Mode it will only display tiles for Username/Password, FIDO, PingMe, OTP, Bluetooth, and Emergency Access authentication methods.

  • Both RapidIdentity Windows Client and RapidIdentity macOS Client can now bind local user accounts to RapidIdentity Server when the accounts don't already exist on the server.

  • Shared Workstation can no longer be bypassed by pressing the Windows Key on Windows 10 when it is in tablet mode.

  • Users who are already enrolled in multi-factor authentication can no longer bypass authentication methods.

  • The Enrollment Wizard only allows enrollment actions.

  • Users are no longer prompted to create and confirm a PIN when setting the password as the PIN when using FIDO authentication.

  • Users are now correctly prompted to reset their passwords when an administrator resets a user's password in the Admin Portal.

  • Usernames can now contain apostrophes.

  • Removed the five-second delay between the time a user presses the CTRL + ALT + DELETE combination and the time the authentication tiles are displayed.

  • The log folder limit size now includes sclog as well as log.txt and backup files.

  • Improved the autofill feature in the Secured Applications form in Google Chrome.

  • Disabling the Turn Off Logon Experience feature now correctly prevents all authentication tiles from being displayed.

  • RapidIdentity clients can now synchronize with RapidIdentity Server when TLS 1.2 is the only security protocol enabled.