Description
Access requests support for AWS Identity Center
AWS Identity Center integration now allows users to request short or long term access to permission sets via Access Requests.
Database access for PostgreSQL via web UI
Database access users can now connect to PostgreSQL databases connected to Teleport right from the web UI and use psql-style interface to query the database.
Hosted email plugin for Access Requests
Users now have the ability to setup Mailgun or generic SMTP server for Access Request notifications using Teleport web UI without needing to self-host the email plugin.
Multi-port support for VNet
Users now supports multiple ports (or a range of ports) with a single TCP application, and Teleport VNet will make all of the application's ports accessible on the virtual network.
Graphical Role Editor
Teleport's web UI includes a new role editor that allows users to create and modify roles without resorting to a raw YAML editor.
Granular SSH port forwarding controls
Teleport now allows cluster administrators to enable local and remote port forwarding separately rather than grouping both types of port forwarding behind a single option.
Other improvements and fixes
- Fixed an issue that could cause some antivirus tools to block Teleport's Device Trust feature on Windows machines. #50453
- Updates the UI login redirection service to honor redirection to
enterprise/saml-idp/sso
path even if user is already authenticated with Teleport. #50442 - Reduced cluster state storage load in clusters with a large amount of resources. #50430
- Updated golang.org/x/net to v0.33.0 (addresses CVE-2024-45338). #50397
- Fixed an issue causing panics in SAML app or OIDC integration deletion relating to AWS Identity Center integration. #50360
- Fix missing roles in Access Lists causing users to be locked out of their account. #50298
- Added support for connecting to PostgreSQL databases using WebUI. #50287
- Improved the performance of Teleport agents serving a large number of resources in Kubernetes. #50279
- Improve performance of Kubernetes App Auto Discover. #50269
- Added more granular access controls for SSH port forwarding. Access to remote or local port forwarding can now be controlled individually using the new
ssh_port_forwarding
role option. #50241 - Properly close ssh port forwarding connections to prevent requests hanging indefinitely. #50238
- Teleport's RDP client now sets the load balancing cookie to improve compatibility with local traffic managers. #50226
- Fixes an intermittent EKS authentication failure when dealing with EKS auto-discovery. #50197
- Expose /.well-known/jwks-okta public endpoint for Okta API services type App. #50177
- Switched to a new role editor UI. #50030
- Added support for multiple ports to TCP applications. #49711
- Allow multiple consecutive occurrences of
-
and.
in SSH server hostnames. #50410 - Fixed bug causing users to see notifications for their own access requests in some cases. #50076
- Improved the cluster initialization process's ability to recovery from errors. #49966
Enterprise:
- Adds AWS Account name to Identity Center Roles and resources. Some manual cleanup may be required where users and Access Lists have been assigned the obsolete roles.
Download
Download the current and previous releases of Teleport at https://goteleport.com/download.
Plugins
Download the current release of Teleport plugins from the links below.
- Slack Linux amd64 | Linux arm64
- Mattermost Linux amd64 | Linux arm64
- Discord Linux amd64 | Linux arm64
- Terraform Provider Linux amd64 | Linux arm64 | macOS amd64 | macOS arm64 | macOS universal
- Event Handler Linux amd64 | Linux arm64 | macOS amd64
- PagerDuty Linux amd64 | Linux arm64
- Jira Linux amd64 | Linux arm64
- Email Linux amd64 | Linux arm64
- Microsoft Teams Linux amd64 | Linux arm64