New features summary
This is a cumulative guide. If a release does not appear in this section, then there were no associated new features and enhancements.

-
Zero Sign-on authentication default option: On macOS later than v11, browser gives preference to Mac Touch ID even when security key is plugged to the laptop during authentication. However, earlier than macOS v11, the default option for authentication is security key and does not allow to select Mac Touch ID. For more information, see Logging into user portal in the Access Guide.
-
Support for Windows Hello or Mac Touch ID administration configuration: Support to register the biometric using Windows Hello or Mac touch ID that lets you securely sign-in to the work websites on registered devices using biometric. For more information, see Registering the biometric for Zero Sign-on authentication in the Access Guide.
-
Support for multi-user scenario for iOS: Session Revocation is now triggered for multi-user sign-in applications. On a shared device, even if a user is signed-out, Session Revocation is still triggered. For more information, see Session Revocation in the Access Guide.
-
Support to configure portal for FIDO security: A configure portal section is added for managed and unmanaged device configuration that displays information if the portal is configured. For more information, see Password-less login from unmanaged devices in the Access Guide.
-
Zero Sign-on rule modification: The Zero Sign-on authenticator is provided in the zero sign-on rule to use FIDO hardware key or Windows Hello or Mac Touch ID. For more information, see Password-less login from managed devices in the Access Guide.
-
Support for new biometric auth methods in the filter: The Windows Hello and Mac Touch ID are now available in the filter for auth method in Zero Sign-on report. For more information, see Zero Sign-on Reports in the Access Guide.

This release includes the following new features and enhancements.
-
Bluetooth support for FIDO users: FIDO users can now unlock their desktop on Android and iOS clients using bluetooth technology in offline mode.
-
Support for MobileIron Authenticate on M1 chip macOS: MobileIron Authenticate is now qualified on M1 chip macOS.
-
Android 12 day zero support: Access Samsung Android 12 day zero is now supported with this release.
-
Support to add email ID format for User Portal: User Portal federation SAML subject should contain a value of email id format. For example: When using Microsoft ADFS as an IDP, the SAML subject LDAP attribute must either be UPN or an email ID.
If email ID format is missing for SAML subject, it causes user portal authentication failure. -
Support for Pagination in the Users search option: Pagination is now available for the users search option in Profile > Users.
-
Support in Access using FIDO hardware keys for unmanaged desktops: For unmanaged desktops, users can now use their FIDO enabled hardware keys to access the service provider with zero sign-on. For more information, see Zero sign-on support in Access using FIDO hardware keys for unmanaged devices in the Access Guide.
-
Device posture information added for Access: Device posture information on Compliant and Non-compliant modes are included for Access. For more information, see UEM Compliance actions and Policies in the Access Guide.