github gravitational/teleport v18.0.1
Teleport 18.0.1

latest releases: v19.0.0-dev.removewasmpack.14, api/v19.0.0-dev.removewasmpack.14, v19.0.0-dev.removewasmpack.13...
one month ago

Caution

Do not upgrade to this version. Introduces a breaking change that is fixed in 18.0.2

  • Fixed backward compatibility for Access List 'membershipRequires is missing' for older terraform providers. #56742
  • Fixed VNet DNS configuration on Windows hosts joined to Active Directory domains. #56738
  • Updated default client timeout and upload rate for Pyroscope. #56730
  • Bot instances are now sortable by latest heartbeat time in the web UI. #56696
  • Enabled automatic reviews of resource requests. #56690
  • Updated Go to 1.24.5. #56679
  • Fixed tbot SPIFFE Workload API failing to renew SPIFFE SVIDs. #56662
  • Fixed some icons displaying as white/black blocks. #56619
  • Fixed Teleport Cache ListUsers pagination. #56613
  • Fixed duplicated db_client CA in tctl status and tctl get cas output. #56563
  • Added cross-account support for EC2 discovery. #56535
  • Terraform Provider: added support for skipping proxy certificate verification in development environments. #56527
  • Added support for CRD in access requests. #56496
  • Added tctl autoupdate agents report command. #56495
  • Made VNet DNS available over IPv4. #56477
  • Fixed missing Teleport Kube Operator permission in v18.0.0 causing the operator to fail. #56466
  • Trait role templating is now supported in the workload_identity_labels field. #56296
  • MWI: tbot no longer supports providing a proxy server address via --auth-server or auth_server, use --proxy-server or proxy_server instead. #55818
  • UX: Forbid creating Access Requests to user_group resources when Okta bidirectional sync is disabled. #55585
  • Teleport Connect: Added support for custom reason prompts. #55557

Enterprise:

  • Renamed Access Monitoring Rules to Access Automation Rules within the WebUI.
  • Prevent the lack of an email_verified OIDC claim from failing authentication when the OIDC connecter is set to enforce verified email addresses.
  • Fixed a email integration enrollment documentation link.
  • Fixed a regression in SAML IdP that caused service provider initiated login to fail if the request was made with http-redirect binding encoding and the user had an active session in Teleport.

Don't miss a new teleport release

NewReleases is sending notifications on new releases.