<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Mideye Release Notes</title>
    <link>https://www.mideye.com/release-notes/</link>
    <atom:link href="https://www.mideye.com/release-notes.xml" rel="self" type="application/rss+xml" />
    <description>New features, enhancements, bug fixes, and security updates across Mideye Server, the ADFS Module, and the Credential Provider.</description>
    <language>en</language>
    <lastBuildDate>Fri, 22 May 2026 00:00:00 GMT</lastBuildDate>
    <item>
      <title>Credential Provider 0.6.10</title>
      <link>https://www.mideye.com/release-notes/credential-provider/#release-credential-provider-0-6-10</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/credential-provider/#release-credential-provider-0-6-10</guid>
      <pubDate>Fri, 22 May 2026 00:00:00 GMT</pubDate>
      <category>Credential Provider</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Group support across rosters</strong><ul><li>Active Directory groups and local groups can now be added to the Assisted Login Users roster — group members are resolved at logon time via LDAP, so there&apos;s no need to enumerate individuals when the population is already maintained in AD.</li><li>The Approvers tab gained a Group picker (Local or Domain) alongside the existing Users list. Add an AD group such as `LAB\approvers` and every current member is eligible to authorise an Assisted Login flow.</li><li>Group entries carry an explicit Local or Domain tag, so on hosts where a local and a domain group happen to share a name the configuration tool always targets the one the operator picked.</li></ul></li><li><strong>Identifier form flexibility</strong><ul><li>User and group identifiers are accepted in all three Windows forms — `DOMAIN\name`, `name@domain.tld`, and `dns.tld\name` — and resolve to the same configured roster entry regardless of which form Windows passes at logon.</li></ul></li></ul><p><em>enhancement</em></p><ul><li><strong>Configuration tool improvements</strong><ul><li>The configuration tool now reflows and adds a horizontal scrollbar on narrow consoles (1024×768 and smaller), so every control on every tab is reachable on the compact server displays typical of Hyper-V, iLO / iDRAC, and out-of-band management sessions.</li><li>The Approvers tab layout mirrors the MFA Override tab so adding individual users and adding group sources use the same controls in both places.</li></ul></li></ul><p><em>known issues</em></p><ul><li><strong>Upgrade notes</strong><ul><li>Drop-in upgrade from any 0.6.x preview — no manual operator step required.</li><li>All configuration is preserved across the upgrade — Schedule cells, Break-Glass roster, Approvers, Policy keys, and credentials are kept as configured.</li></ul></li></ul>]]></description>
    </item>
    <item>
      <title>Credential Provider 0.6.8</title>
      <link>https://www.mideye.com/release-notes/credential-provider/#release-credential-provider-0-6-8</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/credential-provider/#release-credential-provider-0-6-8</guid>
      <pubDate>Wed, 20 May 2026 00:00:00 GMT</pubDate>
      <category>Credential Provider</category>
      <description><![CDATA[<p><em>enhancement</em></p><ul><li><strong>Reliability improvements</strong><ul><li>Mideye+ push approval requests are sent within the push service&apos;s accepted timing range, so prompts reach the device consistently across all Touch-based flows.</li><li>Stored credentials survive VM cloning, sysprep, P2V migration, and domain re-join. Values migrate automatically on the first configuration apply after the underlying machine identity changes — no operator action required.</li><li>Approver-list integrity baselines refresh automatically when the operator applies a configuration change. A new `MideyeProviderConfig.exe --refresh-baselines` command is also available for manual rebuilds if the baseline ever needs to be reset out of band.</li></ul></li><li><strong>Configuration tool improvements</strong><ul><li>Authentication timeouts (MFA, Assisted Login user, Assisted Login approver) are editable directly from the Login Schedule tab instead of requiring a registry change.</li><li>The Lockdown safety dialog has been reworked — the issue list reads as a list (not an editable text box), the dialog is resizable, and the OK / Cancel buttons stay visible even when the list is long.</li><li>The Security Policies tab shows a statistics table of how often each policy event has fired in the last 30 days, read from the Windows Application log.</li><li>External Approvers integrity-check failures emit an alert event instead of blocking logon. An informational event also fires once per startup when an operator runs with a non-AD approver source, so the deployment shape is visible in the Application log without extra tooling.</li><li>Tab layouts (Break Glass, Approvers, Lockdown, Assisted Login Users, MFA Override) share a consistent right-edge margin and reflow correctly when the configuration window is resized.</li></ul></li></ul><p><em>known issues</em></p><ul><li><strong>Upgrade notes</strong><ul><li>Drop-in upgrade from 0.6.7 — no manual operator step required.</li><li>Existing credential values are preserved and migrated automatically on the first configuration apply after the upgrade.</li></ul></li></ul>]]></description>
    </item>
    <item>
      <title>Credential Provider 0.6.6</title>
      <link>https://www.mideye.com/release-notes/credential-provider/#release-credential-provider-0-6-6</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/credential-provider/#release-credential-provider-0-6-6</guid>
      <pubDate>Wed, 13 May 2026 00:00:00 GMT</pubDate>
      <category>Credential Provider</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Preview release</strong><ul><li>Native Windows credential provider DLL that adds Mideye MFA to RDP and console logon.</li><li>Cloud mode (OAuth2 against the Mideye Authentication API) and on-prem mode (LAN-hosted Mideye Server, hardware-token OTP only).</li><li>Touch push (Mideye+ app), hardware-token OTP, OATH HOTP authenticator-app codes, and Assisted Login (4-eye approval).</li><li>168-cell weekly Login Routing schedule with MFA / Assisted / Deny cells, per-user MFA-method overrides, and Deny-schedule override for on-call admins.</li><li>Break-Glass roster required before activation — refuses to enable while empty.</li><li>Internal AD-resolved approvers and External (registry-only) approver roster with HMAC-sealed integrity.</li><li>Signed MSI deployable interactively, silently (`msiexec /qn`), or via Group Policy.</li></ul></li></ul><p><em>known issues</em></p><ul><li><strong>Preview limitations</strong><ul><li>Microsoft Intune deployment guide and Entra-only joined hosts not yet supported in this preview.</li><li>Customer-facing documentation is published for the index, quickstart, and architecture pages only; configure / operate / security / use sections remain drafts.</li></ul></li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.5.25</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-5-25</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-5-25</guid>
      <pubDate>Thu, 19 Feb 2026 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>System error in Mideye Shield (#2571)</strong> — Resolved a null-pointer exception that could occur when the AbuseInfo field was empty.</li><li><strong>Improved risk scoring for blocked login attempts (#2578)</strong> — Adjusted the score weight for login attempts blocked by static username filter rules to align with the score for “user not found” events. This improves scoring consistency and accuracy.</li><li><strong>Logging issue for blocked events (#2580)</strong> — Resolved an issue where the username was logged as NULL for events blocked by Mideye Shield static rules.</li></ul><p><em>enhancement</em></p><ul><li><strong>Authentication log filtering by client IP address (#2584)</strong> — Administrators can now filter authentication logs based on client IP address, improving troubleshooting and audit capabilities.</li></ul><p><em>known issues</em></p><ul><li><strong>Issues if using installation wizard during first time setup</strong> — During installation, only Active Directory repositories can currently be selected in the installation wizard and CIDR subnet notation is not supported for RADIUS Client IPs or Source IPs.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.5.23</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-5-23</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-5-23</guid>
      <pubDate>Fri, 12 Dec 2025 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>RADIUS thread pool size (#2415)</strong> — Fix of bug introduced in release 6.5 where the maximum RADIUS thread pool size did not follow the maximum pending RADIUS requests setting, which could lead to overloading in some situations.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.5.22</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-5-22</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-5-22</guid>
      <pubDate>Tue, 30 Sep 2025 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>enhancement</em></p><ul><li><strong>Support for Palo Alto Client Source IP and Ivanti Tunnel Client Endpoint</strong> — As an alternative to Calling Station ID, Mideye Server can read the client IP address from the Palo Alto vendor-specific attribute &apos;Client Source IP&apos; and the &apos;Tunnel Client Endpoint&apos; attribute sent by Ivanti Connect Secure if present in the RADIUS Access Request.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.5.20</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-5-20</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-5-20</guid>
      <pubDate>Fri, 04 Jul 2025 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>enhancement</em></p><ul><li><strong>Memory and performance optimization</strong> — Increased JVM initial memory allocation from 512M to 1024M for improved performance.</li><li><strong>Database optimization</strong><ul><li>Added index on blocked attempts table for optimized queries.</li><li>Optimized query for cleaning up old blocked attempts.</li></ul></li><li><strong>Configurable retention policies</strong> — Introduced configurable retention periods for blocked attempts and IP ingestion cleanup, allowing flexibility in specifying cleanup duration with enhanced logging.</li><li><strong>Platform upgrade</strong> — Updated OpenJDK to Eclipse Temurin OpenJDK 17.0.15 and migrated installer to 64-bit architecture.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.5.17</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-5-17</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-5-17</guid>
      <pubDate>Tue, 20 May 2025 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>bug fix</em></p><ul><li><strong>Mideye Auth API protocol</strong> — Fixed incorrect error message when user fails to respond to Touch Accept in the Mideye+ app.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.5.16</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-5-16</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-5-16</guid>
      <pubDate>Wed, 14 May 2025 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>enhancement</em></p><ul><li><strong>Mideye Auth API protocol</strong> — Mideye Auth API protocol extended to include the parameter ‘title-text’.</li><li><strong>Mideye Auth API protocol</strong> — Fixed bug where Mideye Auth API protocol parameter ‘authentication-text’ was not enforced for endpoints other than the default endpoint.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.5.15</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-5-15</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-5-15</guid>
      <pubDate>Wed, 23 Apr 2025 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>enhancement</em></p><ul><li><strong>Mideye Server GUI</strong> — Improved the loading time in Mideye Server GUI when updating the dashboard and Authentication Logs.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.5.14</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-5-14</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-5-14</guid>
      <pubDate>Fri, 28 Feb 2025 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>enhancement</em></p><ul><li><strong>Mideye Auth API protocol</strong> — The Mideye Auth API protocol has been extended to include all parameters that can be configured in the server GUI menu ‘Magic Link Endpoints’, submenu ‘User Messages for Touch Accept’.</li></ul><p><em>bug fix</em></p><ul><li><strong>Empty password field</strong> — An empty password field is now accepted when the RADIUS client has been configured to ignore the password.</li><li><strong>EAP challenge-response</strong> — Fix to handle an EAP challenge-response dialog between the RADIUS client and NPS.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.5.13</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-5-13</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-5-13</guid>
      <pubDate>Fri, 14 Feb 2025 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>enhancement</em></p><ul><li><strong>Mideye Shield</strong> — Mideye Shield is listed as a separate section in the server sidebar menu, with submenus for configuration, auto-blocked IPs and static filter rules. The shield service URL is changed to shield.mideye.com. Shield service connectivity health checks are only activated if the Mideye Shield service is enabled. Shield maximum load capacity is increased by immediately returning Access Rejects (instead of random delay), and by increasing the default Max Pending Requests parameter from 20 to 50 in the RADIUS Server configuration.</li></ul><p><em>bug fix</em></p><ul><li><strong>Shield classNotFound Exception</strong> — Resolved LDAPS connection failures (classNotFoundException) when using Mideye Shield.</li><li><strong>RADIUS translation to VSA:s when using MS-CHAPv2</strong> — Fixed MSCHAPv2 LDAP-RADIUS translation to use configured RADIUS VSA attribute instead of the hardcoded CLASS attribute.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.5.12</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-5-12</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-5-12</guid>
      <pubDate>Fri, 10 Jan 2025 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>IP Shielding</strong> — A new central service provides real-time fraud rating of IP addresses for clients requesting access to Mideye-protected login services. The server can be configured to reject requests originating from IP addresses with a fraud score above a chosen level. This enables early-stage detection and rejection of attacks such as DoS, brute force, password spray and MFA fatigue, as well as preventing the flooding of authentication logs.</li><li><strong>Automatic locking of inactive user accounts</strong> — An optional inactivity timeout for database accounts can be configured, after which accounts that haven’t made a successful login are locked. If enabled, this affects all database accounts except the root user.</li></ul><p><em>enhancement</em></p><ul><li><strong>Custom password policy for database users</strong> — The password policies for database accounts can be customized. Two policies are supported, one for passwords set by server administrators via the server gui and one for passwords set by users via the login dialog.  For temporary passwords that are set by server administrators, an optional timeout can be configured, specifying a maximum validity time of the password.</li><li><strong>RADIUS filter can be configured to return Access Rejects</strong> — As an alternative to the silent discard of requests blocked by the RADIUS filter, a RADIUS Access Reject can be returned to the RADIUS client.</li><li><strong>Separate log for blocked attempts</strong> — A new log page in the web GUI, Blocked Attempts, displays attempts that have been blocked by the RADIUS Filter or IP Shielding. Log information (timestamp, username, IP address) is retained for 48 hours.</li></ul><p><em>bug fix</em></p><ul><li><strong>Switch failover logic</strong> — Modified switch failover logic to prevent the delay experienced by users logging in after the server has been idle for more than 10 minutes and fails to connect to the primary switch.</li><li><strong>Entra ID RADIUS translation</strong> — Fixed an issue preventing login to the server web GUI with Administrator / Operator Entra ID accounts due to failing RADIUS translation.</li><li><strong>Authentication Logs Filtering</strong> — Improved filtering of authentication logs by pausing the filtering action until the Apply button is pressed.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.4.6</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-4-6</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-4-6</guid>
      <pubDate>Mon, 18 Nov 2024 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>security</em></p><ul><li><strong>Message-Authenticator for PAP</strong> — As a further enhancement following  CVE-2024-3596 (BlastRADIUS), RADIUS clients can now be configured to include the Message-Authenticator (attribute 80) in all responses, as well as require a message authenticator to be present in all RADIUS access requests.  This fix is required for interworking with some later releases of RADIUS clients, e.g. Fortigate 7.2.10.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.4.5</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-4-5</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-4-5</guid>
      <pubDate>Tue, 01 Oct 2024 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>MS-CHAPv2 challenge-response stops working after Microsoft patch KB5040437</strong> — Additional fix to handle the challenge-response dialog after the KB5040437 security upgrade is deployed in Microsoft NPS. Complements the fixes introduced in versions 6.4.3 and 6.4.4.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.4.4</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-4-4</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-4-4</guid>
      <pubDate>Fri, 30 Aug 2024 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>MS-CHAPv2 stops working after KB5040437</strong> — In this release, we have implemented a complete fix for the issue where MS-CHAPv2 stops working after the KB5040437 security upgrade is deployed in Microsoft NPS. This update corrects the initial fix introduced in version 6.4.3.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.4.3</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-4-3</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-4-3</guid>
      <pubDate>Fri, 09 Aug 2024 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>MS-CHAPv2 stops working after KB5040437</strong> — An initial fix for the MS-CHAPv2 issue related to the KB5040437 security upgrade in Microsoft NPS was introduced in this release. However, further refinement was needed to fully resolve the problem. Please refer to version 6.4.4 for the complete fix.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.4.2</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-4-2</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-4-2</guid>
      <pubDate>Fri, 31 May 2024 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>enhancement</em></p><ul><li><strong>Support for IP subnets</strong> — RADIUS client and shared secret IP addresses can now be specified with IP subnet masks in CIDR format, e.g. 192.168.1.0/24.</li><li><strong>Support TOTP in Auth Type 4</strong> — Authentication type 4 (CONCAT) now also supports on-prem TOTP.</li></ul><p><em>bugfix</em></p><ul><li><strong>Web GUI</strong> — Web GUI encounters an error when viewing Authentication and Audit Logs.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.3.2</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-3-2</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-3-2</guid>
      <pubDate>Fri, 22 Mar 2024 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Authentication types 2,3,4,9,10,11 missing in Accounting logs</strong> — Authentication types 2,3,4,9,10,11 were missing in the Accounting logs. This issue has been resolved in this release.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.3.1</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-3-1</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-3-1</guid>
      <pubDate>Fri, 08 Mar 2024 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>RADIUS blocking filter</strong> — To prevent spamming of server logs, and to counter server overload attacks, custom RADIUS filter rules can be configured in the Mideye server. The filter can block usernames and client IPs that do not meet specified criteria. Blocked requests are silently discarded, are not written to the authentication log table, and do not initiate searches in user repositories.</li></ul><p><em>enhancement</em></p><ul><li><strong>Separation of server web GUI and self-service portal login</strong> — The self-service portal can now be published  spearately from the server web GUI, accessible on a dedicated port and configured as a separate RADIUS client.</li><li><strong>TOTP soft token seeds in LDAP repository</strong> — TOTP soft token seeds can be stored in an LDAP repository instead of the Mideye database. This reduces the need for database clustering.</li></ul><p><em>bugfix</em></p><ul><li><ul><li>Persistant sort order when reloading page. The selected sort order in the web GUI now persists when the page is reloaded.</li><li>Not possible to delete hybrid account if the corresponding LDAP account is not found</li><li>Not possible to create hybrid accounts in Mideye for Azure AD accounts.</li></ul></li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.2.10</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-2-10</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-2-10</guid>
      <pubDate>Tue, 20 Feb 2024 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Not possible to verify and change the RADIUS secret via the server web GUI.</strong></li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.2.9</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-2-9</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-2-9</guid>
      <pubDate>Wed, 20 Dec 2023 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Truncated SMS text in Magic Link migration from release 6.1.</strong></li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.2.8</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-2-8</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-2-8</guid>
      <pubDate>Mon, 30 Oct 2023 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Assisted Password Reset</strong> — The Mideye server provides a web portal for password reset, using the Assisted Login mechanism to give two indepentent factors of authentication.  A user that needs to reset his/her static password contacts an authorized approver and initiates the password reset process with username and second-factor authentication (Mideye+ or SMS-OTP).  The authorized approver is required to approve the reset in the Mideye+ app before the user is allowed to specify a new password.</li></ul><p><em>security</em></p><ul><li><ul><li>Read access to application-prod.yml configuration file on Windows is now limited to server administrators.</li><li>GUI Operators and Administrators could access password hashes via the server API.  This is now blocked.</li><li>Some server API endpoints were availble to GUI Operators, although the corresponding views are blocked for Operators in the GUI. Authorization control of server API and web GUI is now aligned.</li><li>Server info (release version, operating system and database) was available via server web GUI also to non-authenticated users. This is now blocked.</li></ul></li></ul><p><em>enhancement</em></p><ul><li><strong>Assisted Login</strong><ul><li>Improved logging for Assisted Login. In addition to more detailed Info-level logging of events, Assisted Login details are now also saved in separate Audit logs for longer retention to facilitate future security audits.</li><li>The message title &apos;Assisted Login Request&apos; is now configurable. This title in the Mideye+ app was previously hard-coded, and can now be modified in the RADIUS Server configuration menu.</li><li>The lead text to the Assisted Login challlenge message requesting Approver identity (previously hardcoded as &apos;Enter Approver ID&apos;) can now be configured in the &apos;User Messages&apos; tab of the RADIUS Server configuration menu.</li><li>User name presented to approver in app can be configured. Previously, the username entered by the user was presented. Now the AD Display Name is presented per default, but it can be modified in the Assisted Login configuration.</li><li>A RADIUS client display name can now be configured. If configured, this display name is presented to the Assisted Login approver instead of the internal Mideye client name.</li><li>Support for RADIUS session termination cause.  The termination cause is now presented in the RADIUS session logs, as well as in the session list in the app.</li><li>The Assisted Login approver search now continues through the entire search base to find a member of the approver group, not only stopping at the first match.</li><li>Assisted Login now works with user and approver accounts also in repositories other than Active Directory (e.g. OpenLDAP), as well as with accounts in the Mideye database.</li><li>Assisted Login now also works for approvers that haven&apos;t activated Mideye+. Instead, they can approve the login with a Magic Link.</li><li>Triggering of Assisted Login with AD groupname keywords. User and approver group membership is specified using wildcards, where the specified part indicates if it&apos;s a user or an approver.  The remaining (wildcard) part must match between the user and approver. This enables separation of access to multiple systems, without having to specify a separate Assisted Login profile for each system.</li></ul></li><li><strong>Magic Links</strong><ul><li>More flexible Magic Link configuration, including support for multiple endpoints.</li><li>Assisted Login with Magic Link endpoints.  Approvers are listed to the user in the Magic Link landing page.</li><li>Magic Link added as an option when searching/filtering authentication logs based on Authentication Type.</li><li>More detailed logging for Magic Link events in the authentication Logs.</li></ul></li><li><strong>RADIUS</strong><ul><li>Comment field added to RADIUS shared secrets. Optionally, a comment can be added when creating/editing a shared secret, and this field is displayed when presenting the list of shared secrets.</li><li>More informative log messages in case of RADIUS accounting requests being rejected.</li><li>Modified LDAP-RADIUS translation configuration and logic. Now more than one LDAP attribute can be translated.</li><li>Option to filter out ongoing sessions in the RADIUS sessions logs.</li></ul></li><li><strong>Mideye GUI</strong><ul><li>Mideye user search based on phone and token number. Mobile phone and token serial number is added as search parameters when searching for user accounts in the Mideye database.</li><li>Mideye GUI. Clone objects. It is now possible to clone existing objects (LDAP profiles and RADIUS clients) to simplify creation of new objects.</li><li>Mideye users table. a column is added with an icon indicating if an on-premise token (software or hardware) is assigned to the user.</li><li>Root password reset. A new forms-based password utility avoids character encoding problems.</li><li>For Windows installations, a link to the web GUI is added from the desktop and start menu.</li><li>LDAP  and Azure AD connection status indication. The status of connections to user repositories is indicated both in the Directory Settings menues and in the Health Checks menu of the dashboard.</li><li>User search option now available in the LDAP profile configuration menu.</li></ul></li><li><strong>Certificate Management</strong><ul><li>Enhanced presentation of certificates in the Certificate Management menu in the web GUI.</li><li>Support for CSR generation with existing keys and import of new certificate signed by the CA.</li></ul></li><li><strong>On-Prem Tokens</strong><ul><li>Support for on-prem HOTP tokens provided by default.</li><li>Support for automatic re-synchronisation of OATH (HOTP and TOTP) tokens via RADIUS.</li></ul></li><li><strong>Server Logs</strong><ul><li>Support for download of server log files via the web GUI.</li><li>The host name is now included in the authentication log details. This facilitates troubleshooting when multiple Mideye servers share the same database.</li><li>Possibility to filter away successful authentications for specified usernames from the authentication logs. This is to prevent certain accounts, e.g keep-alive probes, from spamming the authentication logs.</li><li>Stack traces removed from info-level logs in order to prevent log spamming.</li><li>Authentication results including username and phone number are included at Info-level in the log file.</li></ul></li><li><strong>Service Monitoring</strong> — Every hour, the server sends a message to the Mideye Switch with information about server release version, platform version, service connectivity status and server time.</li></ul><p><em>bugfix</em></p><ul><li><strong>Assisted Login</strong><ul><li>Password hashes removed when admins (Operator or higher) call /api/mideye-users to list users.</li><li>Limited length of LDAP group name. When specifying LDAP groups in the Web GUI (submenu LDAP Profiles), the group name length was limited to 255 characters.</li><li>Export of accounting data. In previous versions of R6, only the accounting data currently displayed on the screen was exported to a csv file. Now data from the entire selected period is exported.</li><li>Assisted Login approver search fails with Azure AD due to list users api only returns first 100 users.</li><li>Fix of bug where hanging MAS communication could block Assisted Login Touch Accepts.</li><li>Incorrect links to Mideye documentation in the bottom of the server GUI are now fixed.</li><li>Assisted Login auth type is not overwritten the Azure AD default auth type when the userPrincipalName is specified in the Assisted Login profile.</li><li>Assisted Login user search does not work with nested groups.</li><li>Not possible to set expiration date for Mideye database hybrid accounts.</li><li>Authentication type Shared account not working with mobile numbers in AD attribute otherMobile.</li></ul></li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.1.4</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-1-4</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-1-4</guid>
      <pubDate>Wed, 15 Feb 2023 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Magic Link authentication</strong> — A new authentication mechanism whereby the user is authenticated with a magic link distributed via SMS. This enables SMS authentication also for RADIUS clients that lack support for challenge-response. The magic link authentication mechanism is applied for users with Authentication Type 6 (Touch) that haven&apos;t activated Mideye+.</li><li><strong>Magic Link authentication API</strong> — As alternative to RADIUS, the Mideye server provides a rest API with user&apos;s phone number and some optional usability parameters as input.</li><li><strong>Hybrid LDAP accounts</strong> — User accounts read from an external LDAP repository can be duplicated in the Mideye Server database. User parameters such as Authentication Type, mobile number, token number, etc., can be assigned to the account in the Mideye server instead of in the user repository, and will override the information read from the user repository.</li></ul><p><em>security</em></p><ul><li></li><li><strong>Fix of cryptobug in Java CVE-2022-21449.</strong></li></ul><p><em>enhancement</em></p><ul><li><strong>Username filtering</strong> — The configuration of RADIUS client username filtering is enhanced to allow the removal of blank spaces or any specified characters from usernames before the authentication request is processed.</li><li><strong>Switch failover logic</strong> — Enhanced redundancy logic when the Mideye server fails over to a backup switch.</li><li><strong>GUI menu rearrangement</strong> — Web GUI submenu &apos;Locked Users&apos; moved from section &apos;Users and Tokens&apos; to section &apos;Directory Settings&apos;.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 6 6.0.2</title>
      <link>https://www.mideye.com/release-notes/#release-server-6-6-0-2</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-6-6-0-2</guid>
      <pubDate>Mon, 05 Sep 2022 00:00:00 GMT</pubDate>
      <category>Mideye Server 6</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>TOTP tokens with on-premise seeds</strong> — Support for TOTP (OATH) software and hardware tokens where the token seeds are stored in the on-premise Mideye server database, making token validation independent of the central Mideye service. Users can activate a soft token via a self-service web portal, where they also can manage their own soft and hard tokens. Administrators can import hardware tokens via the GUI, and assign both soft and hard tokens to users. The authentication logic can be configured to either use the TOTP token as fallback to the default authentication type (typically Touch Accept), or as the primary authentication type (with no connection to the Mideye central service).</li><li><strong>HOTP hardware tokens with on-premise seeds</strong></li></ul><p><em>enhancement</em></p><ul><li><strong>New web GUI</strong> — A new  web Graphical User Interface for the Mideye Server, with a more intuitive menu structure.</li><li><strong>JRE 17</strong> — Upgrade of the bundled Java platform from Java 8 to Java 17.  Spring Boot upgraded to 2.6.6.</li><li><strong>Encryption of shared secrets</strong> — RADIUS shared secrets are encrypted in the Mideye server database.</li></ul><p><em>bugfix</em></p><ul><li><strong>Improved database error handling in Windows</strong> — In case of DB connection failure, the Mideye Server now fails within 1 minute and stops the service. Only concerns Windows platforms.</li><li><strong>HTTP headers in server GUI</strong> — Security fix in the server web GUI. Content-Security-Policy HTTP security header is added.</li><li><strong>PAP password change</strong> — Directory policies for the new password are now enforced.</li><li><strong>HTTP proxy configuration</strong> — Incorrect status of the checkbox &apos;Use Proxy&apos; in the proxy configuration via the web GUI is fixed.  The connection to the MAS is now also affected if a proxy is configured.</li><li><strong>Usernames not editable</strong> — It is no longer possible to edit usernames of accounts in the Mideye server database.</li><li><strong>MS-CHAP for Assisted Login</strong> — Assisted Login now also works with MS-CHAPv2.</li><li><strong>Possible to specify a certificate alias</strong> — When importing LDAPS certificates, it is now possible to specify a certificate alias.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.6.8</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-6-8</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-6-8</guid>
      <pubDate>Tue, 30 Aug 2022 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>enhancement</em></p><ul><li><strong>RHEL 8 support</strong> — Include service start files for RHEL 8 installation.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.6.7</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-6-7</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-6-7</guid>
      <pubDate>Tue, 21 Jun 2022 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>enhancement</em></p><ul><li><strong>Cached health checks</strong> — Healthchecks are cached to reduce the load on mideyeserver.</li><li><strong>LDAPs Certitiface with alias</strong> — LDAPs Certitiface can be imported with an alias.</li></ul><p><em>bugfix</em></p><ul><li><strong>Fix certificate management UI</strong> — Fix certificate management UI and show proper error message when imported certificate is missing CN.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.6.6</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-6-6</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-6-6</guid>
      <pubDate>Fri, 11 Mar 2022 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Fix file-permissions in deb package</strong> — Set up propper file-permissions in deb package.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.6.5</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-6-5</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-6-5</guid>
      <pubDate>Thu, 10 Mar 2022 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>LDAP migration bug</strong> — Fixed a bug that affected the possibility to migrate certain LDAP profiles from R4 to R5.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.6.4</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-6-4</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-6-4</guid>
      <pubDate>Wed, 26 Jan 2022 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Password encryption bug</strong> — Fix of database user password encryption when upgrading from R4 to R5.</li></ul><p><em>security</em></p><ul><li><strong>Certificate validation</strong> — More stringent certificate validation in Mideye Server.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.6.3</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-6-3</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-6-3</guid>
      <pubDate>Thu, 16 Dec 2021 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>enhancement</em></p><ul><li><strong>Removal of Log4j2 dependencies</strong> — All Log4j2 dependencies removed from classpaths. This blocks the possibility to manually modify the installation package and enable Log4j instead of the default R5 logging framework (Logback).</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.6.2</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-6-2</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-6-2</guid>
      <pubDate>Fri, 01 Oct 2021 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>security</em></p><ul><li><strong>TLS enhancement</strong> — TLS version 1.2 or higher enforced in the Mideye server.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.6.1</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-6-1</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-6-1</guid>
      <pubDate>Fri, 04 Jun 2021 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Unresponsive user search</strong> — Fix of performance issue with username filtering in authentication and accounting logs in the web GUI.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.6.0</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-6-0</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-6-0</guid>
      <pubDate>Wed, 31 Mar 2021 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Shared account authentication</strong> — New authentication type (Auth Type 10) whereby multiple mobile numbers and token card serial numbers can be registered for a user account. In the login dialog, the user indicates which phone/token to use.</li></ul><p><em>enhancement</em></p><ul><li><strong>Java update</strong> — The bundled JRE is updated to Java 8u282. Oracle JRE is replaced by AdoptOpenJDK JRE.</li><li><strong>Database detailed logs</strong> — More efficent database architecture for the Detailed Authentication logs. Note that existing Detailed Authentication logs will be lost at upgrade (the default retention time is otherwise 30 days).</li></ul><p><em>bugfix</em></p><ul><li><strong>Fix of ‘Find User’ issue</strong> — Fix of issue whereby the ‘Find User’ button in the LDAP Profile menu of the Web GUI did not always return a correct result.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.5.6</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-5-6</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-5-6</guid>
      <pubDate>Fri, 12 Mar 2021 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Database cleanup</strong> — Improved database cleanup. Previous implementation could cause database connection to lock during cleanup of logentries table.</li></ul><p><em>enhancement</em></p><ul><li><strong>Cluster leader setting</strong> — New setting in configuration file, whereby a Mideye server can be configured as cluster leader (default=true). If set to false, database cleanup is disabled. This is to avoid simultaneous operations for clustered servers configured to use a common database.</li><li><strong>Database read/write</strong> — More efficent way to write and read authentication log details. This solves a potential database deadlock problem.</li><li><strong>Assisted login for federated users</strong> — Empty federation attributes are not sent to the Mideye+ app. If the approver doesn’t open the app before user login, a proper reply message is returned to ADFS.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.5.5</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-5-5</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-5-5</guid>
      <pubDate>Thu, 21 Jan 2021 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Memory leak</strong> — Fix of bug that caused memory leak if Hibernate cache was enabled.</li><li><strong>Number correction</strong> — Fix of index-out-of-bound-error in phone number correction.</li></ul><p><em>enhancement</em></p><ul><li><strong>Improved loading of authentication logs</strong> — Performance optimization speeding up the loading of authentication logs in the web GUI.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.5.4</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-5-4</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-5-4</guid>
      <pubDate>Mon, 21 Dec 2020 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Azure AD support</strong> — Mideye Server can connect to Azure AD with the Microsoft Graph API to search user accounts.</li><li><strong>Assisted Login for federated users</strong> — Assisted Login protection can be applied to federated accounts logging in via ADFS. External users can log in with their home company accounts, but access is only granted if the login is accepted by an internal approver.</li></ul><p><em>enhancement</em></p><ul><li><strong>Custom LDAP attribute values to logs</strong> — In the LDAP profile configuration, additional LDAP attributes can be specified and the corresponding values written to log files at a specified log level. Optionally, the values can also be written to the detailed authentication logs in the database.</li><li><strong>Ignore LDAPS certificate validation</strong> — As an option, an LDAP profile can be configured to ignore certificate validation. This facilitates automation of LDAP profile provisioning via the server REST API.</li><li><strong>Additional Assisted Login info to logs</strong> — The detailed log information is extended to also include more information relating to Assisted Login, e.g. the identifier of the Assisted Login profile that is being used.</li></ul><p><em>bugfix</em></p><ul><li><strong>GUI user, role Operator</strong> — Fix of R5.4 bug whereby role Operator lacks access to the web GUI. Also a fix of a general R5 bug, whereby role Operator had write/delete access to some menus and APIs.</li><li><strong>Detailed log items not shown in authentication logs</strong> — Fix detailed log items bug in R5.4.4, e.g. Assisted Login additional challenges and the corresponding responses, were not shown in the authentication logs.</li><li><strong>Checkboxes not working at first attempt</strong> — In the web GUI assisted login configuration, approver tab, checkboxes were not working first time they were selected.</li><li><strong>Unexpected error in LDAP profile user search</strong> — Fix of bug resulting in an unexpected error when testing LDAP profile user search before the LDAP profile was configured.</li><li><strong>Assisted login approver ID not honored</strong> — Fix of R5.3 bug. When the approver ID attribute in the Assisted Login configuration was specified, this was not honored.</li><li><strong>User search with MSISDN not working</strong> — Fix of R5 bug. When testing user search via the LDAP profile configuration in the web GUI, MSISDN could not be used as user identity.</li><li><strong>LDAP profile user search</strong> — Fix of R5 bug. When testing user search via the LDAP profile configuration in the web GUI, the search did not return any results.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.4.4</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-4-4</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-4-4</guid>
      <pubDate>Thu, 15 Oct 2020 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>enhancement</em></p><ul><li><strong>RADIUS client overview list</strong> — In the RADIUS clients configurations menu, the start page is modified by replacing the assigned Accounting Server column with assigned LDAP Profiles.</li></ul><p><em>bugfix</em></p><ul><li><strong>Web GUI causing database overload</strong> — Fix of bug introduced in 5.3 whereby detailed authentication log queries from the Web GUI dashboard could cause overload in the database.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.4.3</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-4-3</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-4-3</guid>
      <pubDate>Fri, 02 Oct 2020 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Shared Secret Editing</strong> — Fixed a bug where if the Mideye Server contained more than 127 Shared Secrets, prevented the editing of Shared Secret 128 and above.</li></ul><p><em>change</em></p><ul><li><strong>CentOS 6 &amp; 7 yum repository change</strong> — When using yum to install and update the Mideye Server 5.x in CentOS 6 and CentOS 7, the repository folder structure has changed. See the “Linux RPM installation guide” on how to update the “mideye.repo” file to mirror this.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.4.2</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-4-2</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-4-2</guid>
      <pubDate>Tue, 29 Sep 2020 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Require Mideye+</strong> — RADIUS clients can be configured to require that the Mideye+ app is activated for mobile phone users.</li><li><strong>Require local authentication on phone</strong> — RADIUS clients can be configured to require that Mideye+ users must authenticate locally on the phone (biometric or PIN) before being able to accept a login.</li></ul><p><em>enhancement</em></p><ul><li><strong>Configuration and management menus</strong><ul><li>In the Vendor Specific Vendors configuration menu, vendors are listed in alphabetical order, and attributes are listed alphabetically in submenus for each vendor.</li><li>In the RADIUS clients configurations menu, the start page is simplified by removing some columns. In the Test client sub pages, the placeholder text in the challenge prompt is modified.</li><li>In the dashboard, certificate expiry is added as a separate information box. The Switch health check text is changed from ‘UP’ to ‘Connected’.</li><li>In the Certificate Managment menu, a more informative error message is presented when the certificate subject is empty.</li></ul></li><li><strong>Authentication log</strong> — For failed Assisted Login attempts, the error message now distinguishes between approver not found and approver not authorized.</li><li><strong>Automatic database re-connect</strong> — If the database connection fails at server startup, the Mideye Server makes automatic retries for a specified time period until connection has succeeded.</li></ul><p><em>bugfix</em></p><ul><li><strong>RADIUS server concurrency issue</strong> — Fix of concurrency issue when RADIUS Server fails to re-start after configuration changes.</li><li><strong>Accounting timestamps</strong> — Timstamps in accounting logs now presented in local time with correct timezone indicator.</li><li><strong>RADIUS client assignment for database users.</strong> — Fix of bug affecting database users in MS-SQL. It is now possible to add RADIUS clients.</li><li><strong>Vendor Specific Attributes</strong> — Data types are now shown correctly, and and it is now possible to edit Vendor Specific Attributes.</li><li><strong>SSL certificate management</strong> — If CN is missing in an LDAPS certificate, the hostnamne is now used as certificate alias.<ul><li>Bug in SSL certificate expiry monitoring is fixed.</li></ul></li><li><strong>Authentication log info message</strong><ul><li>Fix of incorrect information message when Touch falls back to OTP due to data push delivery failure.</li><li>Fix of misleading information message when Approver account has missing/invalid phone number.</li></ul></li><li><strong>Authentication logs</strong> — Fix of Authentication logs search filter.</li><li><strong>LDAP profile default values</strong> — Fix of incorrect default attribute names when LDAP server other than Active Directory is selected.</li></ul><p><em>security</em></p><ul><li><strong>Security</strong> — HTTP Trace and Track Methods are disabled in the administrative web interface, and X-Frame-Options response header is added.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.3.5</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-3-5</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-3-5</guid>
      <pubDate>Mon, 14 Sep 2020 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Server GUI unexpected error</strong> — Fix of GUI unexpected error that occurred if dashboard health indicators were clicked while loading.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.3.4</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-3-4</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-3-4</guid>
      <pubDate>Tue, 18 Aug 2020 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Windows installation package</strong> — “;” (semicolon) no longer needs to be inserted manually when using database-instances old keystore is automatically removed when reinstalling the same version of the Mideye Server</li><li><strong>Null pointer exception</strong> — Radius requests with null value NAS-ID and NAS-IP attributes will not cause a null pointer exception.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.3.3</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-3-3</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-3-3</guid>
      <pubDate>Tue, 14 Jul 2020 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>RADIUS session management</strong> — RADIUS sessions (session start, update and stop) for RADIUS clients that support Accounting are presented as a separate menu in the server web GUI. For RADIUS clients that support Disconnect Message, sessions can be terminated from the GUI.</li></ul><p><em>enhancement</em></p><ul><li><strong>Assisted Login</strong> — Assisted Login is enhanced with the following features</li><li><strong>More detailed authentication logs</strong> — Entries in the authentication logs can be extended to view more detailed log information. Old log entries are automatically deleted after a specified retention period. The default retention period for basic authentication and session logs is 365 days. For detailed authentication information, the default retention period is 30 days.</li><li><strong>Time-zone information in log files</strong> — Information about time zone is added to the time stamp in log files.</li></ul><p><em>Assisted Login feature</em></p><ul><li><strong>Management of assisted login sessions from the Mideye+ app</strong><ul><li>The Approver can see and disconnect approved sessions from the Mideye+ app.</li></ul></li><li><strong>Additional challenges</strong><ul><li>The User can be prompted to enter more information via additional challenges in the login dialog. This information is presented to the Approver in the Mideye+ app, and is logged for audit purposes.</li></ul></li><li><strong>Enhanced authorization logic</strong><ul><li>The authorization logic for Assisted Login is enhanced both for Users and Approvers. Approvers can be selected based on a None/Any/All combination of assigned manager, group membership and specified users. The possibility for Approvers to approve sessions for themselves can be enabled/disabled in a separate checkbox. Users can be selected based on a None/Any/All combination of assigned authentication type, group membership and specified users.</li></ul></li><li><strong>Session and idle timeout specified in Assisted Login profile</strong><ul><li>The RADIUS session timeout and idle timeout can be specified in the Assisted Login profile, and are returned as attributes in the Access Accept.</li></ul></li><li><strong>Size limitation of user id and group name fields removed</strong><ul><li>The previous size limitation of user id and group name fields in Assisted Login configuration is removed.</li></ul></li><li><strong>Test of Assisted Login profiles in RADIUS client</strong><ul><li>When Assisted Login profiles have been added to a RADIUS client, the logic (match between Approver and User) can be verified in a test menu accessible from the Assisted Login tab in the RADIUS client configuration.</li></ul></li></ul><p><em>featAssisted Login featureure</em></p><ul><li><strong>Multiple Assisted Login profiles per RADIUS client</strong><ul><li>Multiple Assisted Login profiles can be assigned to a RADIUS client.</li></ul></li></ul><p><em>bugfix</em></p><ul><li><strong>Default OTP Presentation type 1</strong> — Default OTP Presentation type 1 (inbox SMS) now works also when the checkbox ‘Read Optional Attributes’ is selected.</li><li><strong>Either NAS IP or NAS ID must be specified</strong> — New check in the RADIUS client configuration in web GUI that prevents NAS IP and NAS Identifier to be empty at the same time, which would cause RADIUS client identification to fail.</li><li><strong>Faulty RADIUS attribute links in LDAP-RADIUS translation</strong> — Incorrect links associated to RADIUS attributes in LDAP-RADIUS translation are removed.</li><li><strong>Not necessary to specify an LDAP profile</strong> — It is no longer required to specify an LDAP profile when editing a RADIUS client via the web GUI.</li><li><strong>NPE when saving SSL certificate missing CN attribute</strong> — Fix of null-pointer exception when an LDAP SSL certificate missing a CN attribute is saved.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.2.3</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-2-3</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-2-3</guid>
      <pubDate>Fri, 28 Feb 2020 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Debian package</strong> — Added missing files from debian package.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.2.2</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-2-2</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-2-2</guid>
      <pubDate>Tue, 21 Jan 2020 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>R4 Migration Wizard</strong> — To prevent memory overflow, the import of R4 login statistics and accounting data is limited to the last 100 000 rows from the last year.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.2.1</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-2-1</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-2-1</guid>
      <pubDate>Tue, 14 Jan 2020 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Password change in PAP</strong> — Support for password change in PAP, using additional challenges to prompt for a new password. This means that password change is now supported for database users. For LDAP users, this means an NPS is no longer required for password change.</li></ul><p><em>enhancement</em></p><ul><li><strong>Disable Auth Type 1 (Password)</strong> — Authentication Type 1 (Password) can be disabled per RADIUS client.</li><li><strong>Certificate validation and export</strong> — Certificate management via the Web GUI is enhanced to include certificate path validation and an export function.</li><li><strong>Enable blocking of self-personalized Yubikeys</strong> — Self-personalized Yubikeys can be blocked per RADIUS client by only allowing Yubicloud OTPs with the prefix cc.</li><li><strong>Spam filter reset</strong> — The number of users affected by a spam filter lockout is shown in the RADIUS Server configuration menu.</li><li><strong>Database configuration</strong> — The database configuration is now validated in the Windows Installation package. Database passwords containing double-quote characters (“) are now supported, as well as database instances.</li><li><strong>Touch failed user message</strong> — A new user messages added for the case when Touch login fails.</li><li><strong>Assisted login LDAP search</strong> — The LDAP user and approver search is improved, avoiding duplicate search of the user. The approver search now continues to next LDAP repository if the authorization check fails.</li><li><strong>Dashboard</strong> — The Database and Switch connection status information in the GUI dashboard is improved.</li></ul><p><em>bugfix</em></p><ul><li><strong>Reply message when phone not reachable</strong> — For Authentication Type 2 (Mobile), when the phone is not reachable and Mideye+ is not activated (SMS-OTP), the correct reply message is now returned.</li><li><strong>Locked LDAP users</strong> — LDAP users are now locked the specified time period. The extra minute added in previous releases is removed.</li><li><strong>Assisted Login reject reply message</strong> — A reply message is added for the case when an Assisted Login is rejected because the Touch accept failed.</li><li><strong>Spam filter</strong> — Logins rejected by the spamfilter are now shown in the logs. The login failure message when a login is rejected by the spam filter is changed from ‘Invalid/user password’ to ‘Too many attempts, try again later’, with a reference how to manually re-set the filter.</li><li><strong>Assisted login approver group membership</strong> — The approver group membership can now be specified using Java Regular Expressions.</li><li><strong>Default LDAP connect and read timeouts</strong> — The default LDAP connect timeout is changed to 2 seconds, and the read timeout is changed to 10 seconds.</li><li><strong>Handling of invalid RADIUS requests</strong> — When invalid RADIUS requests are discarded, they are now removed from the pending authentications list, thereby preventing the pending request counter from hitting the overload limit.</li><li><strong>Assisted login approver search</strong> — The search failed if the approver was not found in all LDAP profiles configured for the RADIUS client. This is now fixed, it is sufficient if the approver is found in one profile.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.1.3</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-1-3</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-1-3</guid>
      <pubDate>Fri, 25 Oct 2019 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>LDAP user locking release</strong> — Fix of bug ‘LDAP locking not released when using MS-CHAPv2’.</li><li><strong>Access reject with MS-CHAPv2</strong> — Fix of incorrect response authenticator in MS-CHAPv2 Access reject messages. This bug caused multiple Touch prompts when access rejected in the app.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.1.2</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-1-2</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-1-2</guid>
      <pubDate>Fri, 18 Oct 2019 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Assisted login</strong> — A new authentication method, Assisted Login (Auth type 9), for LDAP accounts. Predefined users are authorized to approve access for external users to selected RADIUS clients. Access is approved in the Mideye+ app.This authentication method is intended for users that require temporary access to protected resources.</li><li><strong>Certificate management via web GUI</strong> — Simplified administration of certificates for LDAPS and web GUI.</li><li><strong>Managing RADIUS attributes via web GUI</strong> — New Vendor-specific Attributes (VSAs) can be added via the web GUI. Also, the default VSA list has been extended to include more vendors.</li><li><strong>Spam filter reset</strong> — The OTP spam filter can be reset via the web GUI. This is to prevent users from being locked out if the Max Pending Requests queue is filled up, e.g. after a network incident.</li></ul><p><em>enhancement</em></p><ul><li><strong>RADIUS reply attributes displayed in test client</strong> — When using the test button for RADIUS clients in the web GUI, reply attributes are presented.</li><li><strong>Server Accounting</strong> — Accounting filtering options are enhanced. It is also possible to export the result as a CSV-file from the web GUI.</li><li><strong>Second challenge when token out of sync</strong> — If a token is out of sync, a second challenge is presented to the user requesting a new OTP to re-synchronize the token.</li><li><strong>Search database users by token number</strong> — Database users can be searched using the token serial number.</li><li><strong>Search base automatically created for LDAP profile</strong> — When creating an LDAP profile, the LDAP root search base is automatically populated when clicking the “Save” button.</li></ul><p><em>bugfix</em></p><ul><li><strong>Mobile number missing in logs when Touch cannot be used</strong> — If authentication type Touch fails, the user’s phone number is now included in the log entry.</li><li><strong>Removed re-load redirect to web GUI dashboard</strong> — If reloading a page in the web GUI, the user now remains on the reloaded page.</li><li><strong>root user default profile</strong> — The Web Admin RADIUS client is now assigned to the root user by default.</li><li><strong>Redirect after root password change</strong> — Root user is now redirected to the web GUI dashboard when the password has been changed.</li><li><strong>Reply Message in Web GUI</strong> — RADIUS reply messages are now displayed in the Web GUI login.</li><li><strong>Timestamp in logs</strong> — Log timestamps are now shown in milliseconds instead of seconds.</li><li><strong>Top 5 Failing Users case sensitive</strong> — The Top 5 Failing usernames presented in the web GUI dashboard are now case-insensitive.</li><li><strong>MSISDN/token number validation in Mideye Server</strong> — Mobile number and token serial number formats are now verified in the Mideye Server before being forwarded to the Mideye Switch.</li><li><strong>Web GUI login hanging after timeout</strong> — Page re-load no longer required to login again after session timeout.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 5 5.0.0</title>
      <link>https://www.mideye.com/release-notes/#release-server-5-5-0-0</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-5-5-0-0</guid>
      <pubDate>Sat, 06 Apr 2019 00:00:00 GMT</pubDate>
      <category>Mideye Server 5</category>
      <description><![CDATA[<p><em>breaking change</em></p><ul><li><strong>Major release requires new server installation.</strong> — Mideye 5.0 requires a new server installation. A migration tool facilitates migration from releases 4.6.5 and later.</li></ul><p><em>feature</em></p><ul><li><strong>Server config via web admin</strong> — A new administrative web interface that also replaces the R3/R4 Configuration Tool. A new super administrator role is introduced, with the same rights as the root user.</li><li><strong>Support for server config via REST API</strong> — As an alternative to server configuration via the administrative web interface, a REST API is provided for automated server configuration.</li><li><strong>Configuration changes without restarts</strong> — Configuration changes no longer require service restarts to take effect.</li><li><strong>RADIUS client identification based on NAS ID attribute</strong> — Improved selection of RADIUS clients based on RADIUS attribute 32 (NAS Identifier) which simplifies implementations with multi-login profiles originating from the same IP address.</li><li><strong>Separate table for source IP – shared secret configuration</strong> — Specification of the shared secret is moved from RADIUS clients to a separate table, where source IPs and shared secrets are matched. A default shared secret can be specified that is matched to any IP that is not specified in the table.</li><li><strong>NPS configuration separated from LDAP server configuration</strong> — Microsoft Network Policy Server (NPS) settings are moved from LDAP profile configuration to a separate NPS profile. This simplifies the re-use of the same NPS profile in multiple LDAP profiles.</li><li><strong>Docker container support</strong> — Mideye server is now available as a Docker image as an alternative to Windows and Linux installation packages.</li><li><strong>Debian support</strong> — Mideye server is now available as a Debian-based package in addition to the RPM-based package.</li><li><strong>Enhanced server monitoring</strong> — Automatic health checks of Mideye Switch and database connections. Monitoring of LDAPS certificate expiry. Dashboard with login statistics and success rates.</li><li><strong>Enhanced server accounting</strong> — Possible to select full calendar months in the web GUI for matching server accounting with monthly invoices.</li><li><strong>Support for database login using NTLMv2</strong></li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.7.2</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-7-2</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-7-2</guid>
      <pubDate>Mon, 19 Nov 2018 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Offline challenge (Mideye+) when phone not reachable, authentication type = 2, MSCHAPv2</strong> — In previous releases 4.6.X and 4.7.X, the manual offline challenge was not displayed for authentication type 2 (mobile) when MSCHAPv2 was used.</li><li><strong>Framed IP Address not returned for all IP addresses</strong> — In previous releases 4.6.X and 4.7.X, the Framed IP Address (RADIUS attribute 8) was not returned for IP addresses that were represented by a positive integer in Active Directory.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.7.1</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-7-1</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-7-1</guid>
      <pubDate>Fri, 28 Sep 2018 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Support for EAP-authentication</strong> — Mideye will now forward any incoming RADIUS-packages using EAP-authentication to Microsoft NPS.</li></ul><p><em>bugfix</em></p><ul><li><strong>Proxy-State</strong> — Mideye is now handling Proxy-State (attribute 33) correctly according to RFC 2865.</li><li><strong>User filtering for MS-CHAP-V2 and EAP</strong> — User-filtering for RADIUS-clients is now working for MS-CHAP-V2 and EAP. Before release 4.7.1, user-filtering only worked for PAP.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.6.5.1</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-6-5-1</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-6-5-1</guid>
      <pubDate>Tue, 15 May 2018 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Enabling Event-viewer logging for Windows Server caused Mideye-Radius service to crash</strong> — When enabling Event-viewer logging and restarting the Mideye-services, Mideye-RADIUS did not start.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.6.5</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-6-5</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-6-5</guid>
      <pubDate>Fri, 26 Jan 2018 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Token-coupled Mideye+</strong> — With this feature, an OTP from a token card (MiniToken or YubiKey) is required when activating the Mideye+ app. As an enhanced security setting, RADIUS clients can be configured to only accept login with token-coupled Mideye+ apps or token cards.</li><li><strong>Bundled JRE</strong> — JRE bundled with the Mideye installation package. Java Runtime Environment is included in the installation package and does not need to be installed separately.</li><li><strong>Automatic read of Framed IP Address (RADIUS attribute 8) from Active Directory</strong> — As an option, Mideye reads the static IP Address (IP v4 only) assigned in Active Directory and returns it in the RADIUS Access Accept, attribute 8 (Framed IP Address).</li></ul><p><em>bugfix</em></p><ul><li><strong>Incorrect logging of failed OTP deliveries</strong> — When authentication type 6,7 or 8 (Touch) is selected, failed OTP deliveries for users without Mideye+ are now logged with the correct error message (&apos;Phone not reachable&apos;).</li><li><strong>Multiple groups when using regex</strong> — Mideye Config Tool -&gt; LDAP Servers -&gt; Groups. Multiple LDAP groups can be specified using Java regular expressions. (Previously, only a single group could be specified when regular expressions were used).</li><li><strong>LDAP profile created with an invalid password</strong> — Mideye Config Tool -&gt; LDAP Servers. Fix of a bug that caused unexpected behavior/error messages in case an LDAP profile was created with an invalid LDAP account password.</li><li><strong>Hanging web admin when MySQL connection lost</strong> — Fix of problem with hanging web admin when MySQL database connection was lost.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.5.2</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-5-2</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-5-2</guid>
      <pubDate>Thu, 15 Jun 2017 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Support for Touch login with Microsoft Remote Desktop Services</strong> — By using authentication type 6 (Touch) it is possible to log in with Microsoft Remote Desktop Services (MS RDS) without using challenge-response. This means two-factor authentication with mobile phones can be achieved with the built-in RADIUS support in MS RDS.</li><li><strong>Support for simplified Mideye+ activation</strong> — A new way to activate Mideye+ is introduced. A user no longer needs to enter the mobile phone number manually in the app. The user can activate Mideye+ by entering a &apos;+&apos; sign after the OTP in the challenge dialogue.</li><li><strong>Support for authentication with YubiKey tokens</strong> — YubiKey tokens compatible with Mideye can be ordered from Mideye support. It is possible to specify a Yubikey identifier in the format &apos;ubbc0\[7 digits\]&apos; as a valid token number.</li></ul><p><em>bugfix</em></p><ul><li><strong>Root password to the administrative web interface is lost during an upgrade</strong> — In previous versions of the Mideye Server package for Windows, the root password to the administrative web interface was lost during upgrade.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.4.4</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-4-4</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-4-4</guid>
      <pubDate>Wed, 01 Mar 2017 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>LDAP-RADIUS translation with MS-CHAP</strong> — RADIUS attributes obtained from LDAP-RADIUS translation can now be returned in MS-CHAP Access Accept messages for authentication types PASSWORD (type 1) and TOUCH (types 6, 7 and 8). Previously, this was only possible with authentication types Mobile (type 2) and Token (type 3) when using MS-CHAP. (For PAP, attributes can be included for all authentication types).</li><li><strong>Enhanced multiple-click suppression</strong> — The (optional) multiple-click suppression feature is enhanced to discard events where the user ignores or cancels OTP prompts.</li></ul><p><em>bugfix</em></p><ul><li><strong>Authentication Attempts logs</strong> — Two bugfixes relating to the Authentication Attempt logs in the administrative web interface.<ul><li>RADIUS client ID is now included also in case of challenge-response timeout when using MS-CHAP (previously this information was missing).</li><li>Rejects due to OTP spam filter are now explained in the info column also when using MS-CHAP (previously this information was missing).</li></ul></li><li><strong>Upgrade scripts for Linux</strong> — Previously, the root user password for the administrative web interface was reset during the upgrade procedure. This is now fixed for Linux, but the problem remains in Windows (this will be addressed in the next release).</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.4.3</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-4-3</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-4-3</guid>
      <pubDate>Fri, 10 Feb 2017 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>multiple-click suppression disabled</strong> — Multiple-click logins disabled per default, since it&apos;s only applicable for certain RADIUS clients and it caused some unexpected behavior.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.4.2</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-4-2</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-4-2</guid>
      <pubDate>Tue, 13 Dec 2016 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Suppressing multiple-click logins</strong> — This feature suppresses multiple-click logins in RADIUS clients. It is enabled by default and can be configured via Mideye Configuration Tool, tab Radius Servers. Having this feature enabled prevents users from receiving numerous consecutive OTPs if they mistakenly keep pressing the login button in the client.</li><li><strong>Improved overload handling</strong> — This feature improves overload handling by rejecting additional requests if the number of pending requests exceeds a threshold– maximum number of pending requests that can be configured via Mideye Configuration Tool, tab Radius Servers. This makes the Mideye Server more responsive in overload situations.</li><li><strong>Preventing OTP spamming</strong> — This feature limits the number of OTP deliveries to a specific phone number within predefined time windows. The allowed number of OTP deliveries can be configured via Mideye Configuration Tool, tab Radius Servers.</li></ul><p><em>bugfix</em></p><ul><li><strong>MS-CHAPv2 reject</strong> — A previous bug in MS-CHAPv2 reject is fixed. The bug caused some RADIUS clients to send a duplicate request after the first request had been rejected.&apos;</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.4.1</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-4-1</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-4-1</guid>
      <pubDate>Wed, 02 Nov 2016 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Support for Mideye+ Touch Accept</strong> — Mideye+ Touch Accept enables Mideye+ users to accept or reject the login directly using the Mideye+ client (on iOS and Android), see Figure 2.1. It improves user experience by removing the need to manually enter the OTP. The following are the requirements for Touch Accept to work.<ul><li>Mideye Server 4.4.x</li><li>Mideye+ client version 3.x.x</li><li>Mideye+ is enabled in the customer’s profile in Mideye central system</li></ul></li><li><strong>New authentication types.</strong> — Introduction of three new authentication types, they differ in fallbacks in case the initial Touch Accept attempt fails (e.g. if the user lacks Internet connectivity).<ul><li>Authentication type 6 (Touch) - No fallback if Touch Accept fails.</li><li>Authentication type 7 (Touch-Plus) - If Touch Accept fails, the fallback is Mideye+ manual signature.</li><li>Authentication type 8 (Touch-Mobile) - If Touch Accept fails, Mideye attempts to reach the Mideye+ app via SMS. If this also fails, the fallback is Mideye+ manual signature.</li></ul></li><li><strong>Mideye+ Touch Accept on Android client</strong> — Mideye+ Touch Accept is now available on the Android client.</li><li><strong>Enhanced authentication attempts log in Web Administration Interface</strong> — This feature enhances the authentication attempts log with information about failed authentications. The authentication attempts log now also contains phone/token number and authentication type as well as the reason for failure.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.3.3</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-3-3</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-3-3</guid>
      <pubDate>Mon, 30 Nov 2015 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Mideye Server hanging problem while using Mideye Configuration Tool</strong> — This bug caused Mideye Server to hang when using Mideye Configuration Tool to modify a RADIUS Client.</li><li><strong>Fixed the challenge message when the password is expired</strong> — This bug caused database users to receive Password needs to be reset if an LDAP user had to change the password prior to their login.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.3.2</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-3-2</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-3-2</guid>
      <pubDate>Wed, 03 Jun 2015 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Security issue</strong> — Prevent the exposure of the content of WEB-INF folder. - Removed unused certificates to improve the security of Mideye Server - Mideye Switch communication.</li><li><strong>Log messages</strong> — Reduce the log level to warning when the Network Policy Server (NPS) is not configured. - Reduce the log level to debug when parsing an unknown Vendor Specific Attribute.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.3.1</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-3-1</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-3-1</guid>
      <pubDate>Wed, 21 Jan 2015 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Password Change</strong> — Users in Active Directory can change their expired passwords during the logon process. This feature requires the use of the MS-CHAP v2 protocol and Network Policy Server (NPS).</li><li><strong>MS-CHAP v2</strong> — Mideye Server supports the MS-CHAP v2 protocol. Mideye Server will automatically determine the authentication protocol used, PAP or MS-CHAP v2. To function properly, MS-CHAP v2 needs a configured NPS.</li><li><strong>New Web Administration Interface</strong></li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.3.0</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-3-0</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-3-0</guid>
      <pubDate>Thu, 27 Nov 2014 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Mideye Server 4.3.0 includes a new Web Administration Interface.</strong> — The new Web Administration Interface is a web-based tool for managing the Mideye Server.</li><li><strong>LDAP login to Web Administration Interface</strong> — The new Web Administration Interface allows login using an LDAP server</li><li><strong>Password Comparison Authentication</strong> — It is possible to use an alternative field for storing hashed passwords instead of the default Active Directory password field. See Appendix A: Password Comparison in the reference guide for more details.</li><li><strong>Fortinet RADIUS attributes</strong> — Added Fortinet vendor specific attributes (Vendor ID: 12356) to the list of RADIUS attributes sent together with the final RADIUS Access Accept.</li><li><strong>Automatic Retrieval of LDAP Base Distinguished Name</strong> — When adding a new LDAP server, Mideye Server retrieves the base Distinguished Name automatically.</li><li><strong>Removal of Embedded Java Virtual Machine</strong> — Mideye Server 4.3.0 no longer includes Java Virtual Machine (JVM) and it must be installed separately before the installation. This allows more frequent updates of JVM independently from the Mideye Server.</li><li><strong>Removal of Alarm Manager</strong> — Alarm Manager service, installed along with Mideye Server in previous versions, has been removed.</li><li><strong>Removal of Radius Accounting</strong> — The RADIUS accounting server (used to run on port 1813) has been removed.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.2.6</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-2-6</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-2-6</guid>
      <pubDate>Thu, 30 Jan 2014 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Windows services start-up</strong> — Fixed a bug causing the Mideye windows services not to start automatically after executing windows updates or rebooting the server.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.2.5</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-2-5</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-2-5</guid>
      <pubDate>Mon, 08 Apr 2013 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>R4.2.4 feature support in Windows</strong> — All enhancements and bug corrections in 4.2.4 are included in 4.2.5 and made available for Windows.</li><li><strong>Support for client certificate authentication for the administrative web interface</strong> — Client certificates can be generated from the default server certificate that is generated during server installation, and the administrative web interface can be configured to require a client certificate to grant access.</li></ul><p><em>bugfix</em></p><ul><li><strong>Increased maximum length of LDAP group names</strong> — In previous releases, the maximum length of LDAP group names was limited to 30 - characters in order for the accounting to work properly. The limit has been increased to 200 characters.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.2.4 linux only</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-2-4 linux only</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-2-4 linux only</guid>
      <pubDate>Mon, 04 Mar 2013 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Support for secondary mobile number in LDAP</strong> — If no mobile number is found in the assigned (primary) mobile attribute, Mideye can be configured to continue the search in a secondary attribute (e.g. ‘otherMobile’).</li><li><strong>Default support for SSL in the administrative web interface</strong> — The administrative interface is per default protected with SSL, and a self-signed certificate is generated during the installation.</li><li><strong>Enhanced and modified presentation of logs via the administrative web interface</strong> — Several log files in the directories /opt/mideyeserver/log/ and /opt/tomcat/logs/ can be viewed via the administrative web interface. It is possible to add/exclude files, and also to add other folders. The logs are presented in a separate window and are not protected with the web interface login. It is recommended to restrict web interface access to specific IP addresses, thereby allowing/restricting log access to e.g. helpdesk personnel.</li><li><strong>SNMP traps</strong> — Support for SNMP traps is introduced. The Mideye PEN is 40761.</li><li><strong>Support for wild-card group check in Active Directory</strong> — AD group membership can be specified as a Java regular expression. ‘CN=mideyeusers,.\*’ will now match ‘CN=mideyeusers,OU=Stockholm,OU=Groups,DC=mideye,DC=com’. This feature is only valid for Active Directory.</li><li><strong>Java and Tomcat update</strong> — Java is updated to Java SE Runtime Environment (build 1.7.0\_11-b21), and as web server TomEE 1.5.1 with Apache Tomcat Version 7.0.34 is used.</li></ul><p><em>bugfix</em></p><ul><li><strong>Handling hanging LDAPS connections</strong> — The LDAP connection timeout parameter is modified to include the LDAP connection pool avoiding the risk of overload in case of hanging LDAPS connections.</li><li><strong>Authentication type CONCAT for database users</strong> — Authentication type CONCAT now works also for database users. (Bug introduced in 4.1).</li><li><strong>Event Viewer disabled on Linux installations</strong> — It is no longer possible to enable the Event Viewer on Linux installations.</li><li><strong>Special characters in RADIUS shared secret</strong> — Special characters (e.g. å, ä, ö) are now allowed in the RADIUS shared secret.</li><li><strong>Help button active on Linux installations</strong> — The Help button in the Configuration Tool is now active also on Linux installations.</li><li><strong>Automatic database upgrade on Linux</strong> — Database scripts are now executed automatically when doing upgrades on Linux systems.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.2.3</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-2-3</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-2-3</guid>
      <pubDate>Tue, 24 Jul 2012 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Configuration Tool enhancements</strong> — Config Tool can now automatically identify and upgrade an existing Mideye database (from R3.0 and later). Config Tool automatically prompts for Admin rights when started.</li><li><strong>RADIUS Server enhancements</strong> — Pre-configured Norwegian and Finnish RADIUS reply messages. RADIUS server names can be up to 200 characters long (previously limited to 20 characters).</li><li><strong>RADIUS Client enhancements</strong> — RADIUS clients can be renamed. RADIUS client names can be up to 200 characters long (previously limited to 16 characters). The RADIUS shared secret must be specified (the field cannot be left empty).</li><li><strong>LDAP Server enhancements</strong> — LDAP search base can contain ‘/’ signs. LDAP connection test does not return false positive if the password field is empty.</li><li><strong>Number correction enhancements</strong> — Numbers containing only one parenthesis are auto-corrected if number correction is activated.</li><li><strong>Accounting enhancements</strong> — Group names up to 200 characters supported (previously limited to 30 characters).</li><li><strong>Number filtering in Mideye Server</strong> — Mobile numbers (and token serial numbers) that do not follow the required formats are blocked in the Mideye Server before an OTP delivery/verification request is forwarded to the Mideye Switch. For mobile numbers, this means that they must start with a + – sign and contain 3 to 20 digits. Note that this means that mobile numbers in the format 07xxxxx and 00xxxxxxx that previously have occasionally been working are now blocked. Customers with these number formats are recommended to apply automatic number correction in the Mideye Server.</li><li><strong>LDAP-RADIUS translation enhancements</strong> — LDAP-RADIUS translation is no longer case-sensitive. LDAP-RADIUS wildcard translation is supported, whereby a translation rule can be specified as a Java regular expression (e.g. ‘CN=mideyeusers,.\*’ will now match ‘CN=mideyeusers,OU=Stockholm,OU=Groups, DC=mideye,DC=com’).</li></ul><p><em>bugfix</em></p><ul><li><strong>LDAP-RADIUS translation</strong> — It is no longer needed to activate the ‘Read optional attribute flag’ in order to use LDAP-RADIUS translation (4.2.2 bug resolved in 4.2.3).</li><li><strong>Authentication with suffixes fails when user search continues to next LDAP server</strong> — Authentication with user-name suffixes (e.g. @TOKEN, @MOBILE) now works also when the user search continues to the next LDAP server in the search base (4.2.2 bug resolved in 4.2.3).</li><li><strong>Help buttons not active</strong> — Help buttons in the Configuration Tool are now active again (4.2.2 bug resolved in 4.2.3).</li><li><strong>Auth Type = CONCAT gives an unhandled error when group check fails</strong> — Failed group check when using authentication type CONCAT is now properly handled. (4.2.2 bug resolved in 4.2.3).</li><li><strong>Web Admin access from a remote computer</strong> — The Administrative Web Interface is automatically configured to allow access from a remote computer (4.2.2 bug resolved in 4.2.3).</li><li><strong>Nested group selected without specified groups gives an error</strong> — ‘Search nested groups’ can now be selected in Config Tool also when no group selection has been specified (4.2.2 bug resolved in 4.2.3).</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.2.2</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-2-2</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-2-2</guid>
      <pubDate>Mon, 21 Feb 2011 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Linux package enhancements</strong> — Native look-and-feel in Mideye Config Tool on Linux. Possibility to execute Mideye Config Tool from any directory. Simplified setup of X11 over SSH (making it possible to execute Mideye Config Tool from another workstation).</li></ul><p><em>bugfix</em></p><ul><li><strong>Not possible to delete a RADIUS client that has an LDAP server assigned</strong> — This bug is resolved.</li><li><strong>List of pending authentications is cleared after OTP expiry</strong> — The internal Mideye Server list of pending authentications is cleared after OTP expiry, instead of every 5 minutes. This means RADIUS clients that fail to increment the RADIUS packet identifier will not cause user lockout longer than the OTP validity time (default 60 seconds). This resolves a usability issue with e.g. Citrix Access Gateway Standard Edition.</li><li><strong>Config Tool enhancements</strong> — Config Tool no longer prompts to save unsaved changes when setting up a database for the first time. Miscellaneous enhancements concerning Return key, database name and LDAP Server test connection.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.2.1</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-2-1</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-2-1</guid>
      <pubDate>Tue, 28 Dec 2010 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>User search via config tool fails if Authentication Type = 1</strong> — 4.2.0 bug resolved in 4.2.1.</li><li><strong>Web Admin ROOT password cannot be changed when using two-way encryption</strong> — 4.2.0 bug resolved in 4.2.1.</li><li><strong>Limited length of user password</strong> — In previous releases, the static password maximum length was 48 characters for LDAP users and 16 characters for database users. Both these limitations have been removed.</li><li><strong>Unlimited number of log lines presented via Web Interface</strong> — 4.1.0 bug resolved in 4.2.1. The number of log lines presented via the Administrative Web Interface is now limited to the number specified in the filter settings.</li><li><strong>New address field for database connection in Config Tool</strong> — In 4.2.1, the database connection address field in the Mideye Configuration Tool is modified. This resolves previous issues when specifying external databases.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.2.0</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-2-0</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-2-0</guid>
      <pubDate>Thu, 09 Dec 2010 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>LDAP over SSL</strong> — Support for SSL protection of connections to LDAP servers. This is implemented via an optional checkbox in the LDAP Server tab of Mideye Configuration Tool. LDAP server certificates can be automatically downloaded.</li><li><strong>Continued LDAP search in case of group membership requirements not fulfilled</strong> — In case a user account is found in an LDAP repository but does not fulfill the specified group membership requirements, the user search continues to other repositories (if more repositories are defined). In previous releases, an access reject was immediately returned if group membership requirements were not fulfilled, which caused the user search to be discontinued.</li><li><strong>Removal of user name suffixes and prefixes</strong> — As an option, suffixes and prefixes added to user names in the RADIUS access request can be removed before the user name is searched in the user repository. The removal (suffix or prefix, and separator) is specified on a per-RADIUS-client basis.</li><li><strong>Accounting filtering based on LDAP repository and department</strong> — The accounting filtering is enhanced with the option to filter data based on which LDAP server and department the user belongs to. The optional Department attribute is specified in the Mideye Configuration tool. This attribute is read from the user repository and stored in the accounting database in Mideye. Mideye accounting granularity is thereby enhanced, facilitating distribution of Mideye costs based on which LDAP server and department the user belongs to.</li><li><strong>Enhanced encryption of passwords in the internal database</strong> — An enhanced one-way hash encryption is added as an option for passwords stored in the internal database. This encryption alternative cannot be reversed.</li><li><strong>Increased size of database fields</strong> — Database fields with variable input length, such as LDAP search bases and group names, have been increased to the maximum size allowed by the respective database (MS SQL and MySQL).</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.1.0</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-1-0</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-1-0</guid>
      <pubDate>Thu, 01 Jan 1970 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Log enhancements</strong> — The Mideye Server logging functions are enhanced. With this release, the logging facility is implemented as a separate service that is configured via the Mideye Configuration Tool. Separate logs are written for the three main services Alarm Manager, RADIUS Server and Administrative Interface. For each log, the level of detail is specified (Error, Warning, Info, Debug, Trace). It is also possible to configure log messages to be forwarded to an external system according to the Syslog standard or to be written to the Windows Event Viewer. The Mideye Server can also be configured to generate emails for certain log events. This is specified directly in an XML file. A bug in previous releases when running on W2008, where the timestamps in the log file were specified with GMT instead of the local server time, is corrected.</li><li><strong>LDAP enhancements</strong> — The LDAP search function is enhanced with two configurable timeout parameters to improve serial search capabilities in multiple LDAP directories in case one LDAP server is faulty. A bug correction ensures that LDAP directories are searched in the order specified in the Configuration Tool.</li><li><strong>Automatic retries in case of failed service start-up</strong> — In case of Mideye services fail to start properly, subsequent re-starts are attempted with 5-minute intervals during a time period of one hour. This is to enable system recovery in case of start-up failure, e.g. after an automatic update of the server platform operating system.</li><li><strong>Installation and compatibility issues</strong> — An automated upgrade package from Mideye Server releases 3.0.1 - 4.0.3 is available. The upgrade package includes the execution of database scripts and replacement of jar files. The upgrade requires a re-start of Mideye services. If SSL protection is implemented for the administrative web interface, certificates and the Tomcat server.xml file should be saved before performing the upgrade. - Upgrade from releases prior to Mideye Server 3.0 is not supported, and requires a new server installation.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.0.3</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-0-3</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-0-3</guid>
      <pubDate>Thu, 01 Jan 1970 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Enhanced database pool handling</strong> — Automatic recovery of faulty database connection whereby the connection is closed and removed from the pool. Also, no lower limit is set to the time a database connection is kept in the pool. Previously, the minimum time was 5 minutes, regardless of which value was specified via the Configuration Tool.</li><li><strong>Compatibility with SQL Server 2008</strong> — Enhancement in the installation package, enabling compatibility with SQL Server 2008.</li></ul><p><em>bugfix</em></p><ul><li><strong>Configurable switch connection timeout</strong> — A bug correction whereby the switch connection timeout specified via the Configuration Tool is actually implemented. (In releases 3.0.0 – 4.0.1 it was always 60 seconds, regardless of which value was specified in the Configuration Tool).</li><li><strong>Installation and compatibility issues</strong> — An automated upgrade package from Mideye Server release 3.0 is available. The upgrade package includes the execution of database scripts and replacement of jar files. The upgrade implies a re-start of Mideye services. Upgrade from releases prior to Mideye Server 3.0 is not supported, and requires a new server installation.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.0.2</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-0-2</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-0-2</guid>
      <pubDate>Thu, 01 Jan 1970 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Enhanced installation package</strong> — The new installation package is enhanced, e.g. it includes a notification that an SQL Server already exists on the server platform, if this is the case.</li><li><strong>Accounting support for phone numbers longer than 12 characters</strong> — Previously, phone numbers longer than 12 characters (including the ‘+’-prefix) were not written to the server accounting tables. In 4.0.1, numbers up to 20 characters (including the ‘+’-prefix) are written to the accounting tables.</li><li><strong>Password reset / expired information text included in Access Challenge</strong> — In case the static AD password has expired or needs to be reset, this information is presented to the end-user in the Reply-Message included in the RADIUS Access Challenge sent by the Mideye Server to the RADIUS client.</li></ul><p><em>bugfix</em></p><ul><li><strong>Configurable fallback retry parameter</strong> — A bug correction whereby the switch connection fallback retry specified via the Configuration Tool is actually implemented. (In releases 3.0.0 – 4.0.1 it was always 50, regardless of which value was specified in the Configuration Tool).</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.0.1</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-0-1</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-0-1</guid>
      <pubDate>Thu, 01 Jan 1970 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>New installation package</strong> — A new installation package, where the Mideye server is installed with an MSI file.</li></ul>]]></description>
    </item>
    <item>
      <title>Mideye Server 4 4.0.0</title>
      <link>https://www.mideye.com/release-notes/#release-server-4-4-0-0</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/#release-server-4-4-0-0</guid>
      <pubDate>Thu, 01 Jan 1970 00:00:00 GMT</pubDate>
      <category>Mideye Server 4</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Support for Mideye Plus authentication</strong> — Server release 4.0 supports Mideye Plus authentication. Mideye Plus enables login when the phone is outside of network coverage. For this to work, it is required that the user’s network operator has implemented support for Mideye Plus on the SIM card.</li><li><strong>Selection of ISO/UTF encoding on a per-RADIUS-client basis</strong> — In R4, UTF-8 or ISO8859\_1 encoding can be configured on a per-RADIUS-client basis. This enables handling of special characters (e.g. å, ä, ö, ¤, and €) in user names and passwords, which previously could cause problems because different RADIUS clients have implemented different character encoding schemes.</li><li><strong>Server keep-alive messages</strong> — Server keep-alive messages are sent with 10-minute intervals to the Mideye Switch. The keep-alive messages contain information about Mideye server release, system status (RAM used/available), the status of LDAP connections and the number of database connections in use. The purpose of this feature is to enhance the centralised supervision of the authentication service. The keep-alive function is enabled/disabled via the Configuration Tool.</li><li><strong>Blocking of LDAP accounts in the Mideye Server</strong> — For each LDAP server, a threshold can be defined in the Mideye Server. If for a given user, the number of consecutive failed LDAP authentications exceeds this threshold, the user is locked in the Mideye Server. A time period can be specified, after which the user is automatically unlocked. It is also possible to unlock the user via the Mideye Administrative Web Interface. The purpose of this feature is to prevent denial-of-service (DOS) attacks aimed at blocking LDAP accounts via Internet.</li><li><strong>Time-limited accounts for database users</strong> — An expiry date can be specified for user accounts in the internal database (database users). User accounts are automatically disabled when this date has been reached.</li><li><strong>Automated token card re-synchronisation</strong> — If a token card is more than 10 consecutive OTPs out of sync with the central system, but inside a sequence window of 100, the user can automatically re-sync the token card by generating a new OTP and entering it for validation. If this second OTP is within a sequence window of 10 OTPs from the first OTP, the user is granted access and the token card is re-synchronised. The time window for performing the re-synchronisation is 5 minutes from the time when the first OTP was entered for validation. If the RADIUS client supports Mideye reply messages (attribute 18 in RADIUS Access Reject), the user is informed that the token card is out of sync and that a new OTP is required. Automated token card re-synchronisation has been centrally implemented in the Mideye Switch. This means that the feature is automatically implemented for all Mideye Servers, regardless of release. However, the reply message informing the user that the token is out of sync and that a new OTP is required, is only implemented in Server release 4.0.</li><li><strong>Support for default RADIUS reply and error messages in different languages</strong> — Via the configuration tool, default RADIUS reply and error messages can be selected in English and Swedish.</li><li><strong>Enhanced number correction</strong> — Number correction is enhanced. Via the Configuration Tool, it can be selected if numbers within parentheses should be removed and if leading zeros after the default international prefix should be removed.</li></ul>]]></description>
    </item>
    <item>
      <title>ADFS Module 3.1.0</title>
      <link>https://www.mideye.com/release-notes/adfs/#release-adfs-3-1-0</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/adfs/#release-adfs-3-1-0</guid>
      <pubDate>Thu, 01 Jan 1970 00:00:00 GMT</pubDate>
      <category>ADFS Module</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>ADFS Module improvements</strong><ul><li>Support for passwordless authentication with Mideye set as primary authentication provider.</li><li>Mideye AD FS module now comes with two adapters, allowing different configurations for each adapter.</li></ul></li></ul><p><em>enhancement</em></p><ul><li><strong>ADFS Module enhancements</strong><ul><li>Support for update without previous uninstall.</li></ul></li></ul><p><em>bugfix</em></p><ul><li><strong>ADFS Module bugfix</strong><ul><li>Possible to modify adapter friendly name without uninstall (only in single-node installations).</li></ul></li></ul><p><em>known issues</em></p><ul><li><strong>Modifying adapter friendly name in ADFS farms still requires uninstall of secondary nodes.</strong></li></ul>]]></description>
    </item>
    <item>
      <title>ADFS Module 3.0.0</title>
      <link>https://www.mideye.com/release-notes/adfs/#release-adfs-3-0-0</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/adfs/#release-adfs-3-0-0</guid>
      <pubDate>Thu, 01 Jan 1970 00:00:00 GMT</pubDate>
      <category>ADFS Module</category>
      <description><![CDATA[<p><em>known issues</em></p><ul><li><ul><li>Update requires a uninstall.</li><li>Uninstall of V3.0.0 is done with the install package.</li></ul></li></ul>]]></description>
    </item>
    <item>
      <title>ADFS Module 2.3.4</title>
      <link>https://www.mideye.com/release-notes/adfs/#release-adfs-2-3-4</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/adfs/#release-adfs-2-3-4</guid>
      <pubDate>Thu, 01 Jan 1970 00:00:00 GMT</pubDate>
      <category>ADFS Module</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Added button to RADIUS configuration editor that sets correct permission for the ADFS-module.</strong></li></ul>]]></description>
    </item>
    <item>
      <title>ADFS Module 2.3.3</title>
      <link>https://www.mideye.com/release-notes/adfs/#release-adfs-2-3-3</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/adfs/#release-adfs-2-3-3</guid>
      <pubDate>Thu, 01 Jan 1970 00:00:00 GMT</pubDate>
      <category>ADFS Module</category>
      <description><![CDATA[<p><em>features</em></p><ul><li><ul><li>Updated “Test Connection” tab GUI in ADFS Configuration Tool.</li><li>Updated language files.</li><li>Updated design of the login page.</li></ul></li></ul><p><em>bugfix</em></p><ul><li><strong>Fixed a bug in ADFS Configuration Tool where changing language removed translations.</strong></li></ul>]]></description>
    </item>
    <item>
      <title>ADFS Module 2.3.2</title>
      <link>https://www.mideye.com/release-notes/adfs/#release-adfs-2-3-2</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/adfs/#release-adfs-2-3-2</guid>
      <pubDate>Thu, 01 Jan 1970 00:00:00 GMT</pubDate>
      <category>ADFS Module</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Added functionality to show/hide OTP on login page.</strong></li></ul><p><em>bugfix</em></p><ul><li><strong>Fixed a bug with supported OTP length.</strong></li></ul>]]></description>
    </item>
    <item>
      <title>ADFS Module 2.3.1</title>
      <link>https://www.mideye.com/release-notes/adfs/#release-adfs-2-3-1</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/adfs/#release-adfs-2-3-1</guid>
      <pubDate>Thu, 01 Jan 1970 00:00:00 GMT</pubDate>
      <category>ADFS Module</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Added support for Yubikey.</strong></li></ul>]]></description>
    </item>
    <item>
      <title>ADFS Module 2.3.0</title>
      <link>https://www.mideye.com/release-notes/adfs/#release-adfs-2-3-0</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/adfs/#release-adfs-2-3-0</guid>
      <pubDate>Thu, 01 Jan 1970 00:00:00 GMT</pubDate>
      <category>ADFS Module</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Added functionality in ADFS Configuration Tool for verifying Radius server connectivity.</strong></li></ul><p><em>enhancement</em></p><ul><li><strong>Extended logging capabilities with ‘Off’ and ‘Warnings and Errors’ modes.</strong></li></ul>]]></description>
    </item>
    <item>
      <title>ADFS Module 2.2.1</title>
      <link>https://www.mideye.com/release-notes/adfs/#release-adfs-2-2-1</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/adfs/#release-adfs-2-2-1</guid>
      <pubDate>Thu, 01 Jan 1970 00:00:00 GMT</pubDate>
      <category>ADFS Module</category>
      <description><![CDATA[<p><em>bugfix</em></p><ul><li><strong>Fixed a bug with users using the Android app.</strong></li></ul>]]></description>
    </item>
    <item>
      <title>ADFS Module 2.2.0</title>
      <link>https://www.mideye.com/release-notes/adfs/#release-adfs-2-2-0</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/adfs/#release-adfs-2-2-0</guid>
      <pubDate>Thu, 01 Jan 1970 00:00:00 GMT</pubDate>
      <category>ADFS Module</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Added functionality to set necessary registry and event viewer permissions when starting ADFS Configuration Tool.</strong></li></ul>]]></description>
    </item>
    <item>
      <title>ADFS Module 2.1.0</title>
      <link>https://www.mideye.com/release-notes/adfs/#release-adfs-2-1-0</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/adfs/#release-adfs-2-1-0</guid>
      <pubDate>Thu, 01 Jan 1970 00:00:00 GMT</pubDate>
      <category>ADFS Module</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Added functionality to set necessary registry and event viewer permissions when starting ADFS Configuration Tool.</strong></li></ul><p><em>enhancement</em></p><ul><li><strong>Extended logging capabilities with ‘Info’ and ‘Debug’ modes.</strong></li></ul><p><em>bugfix</em></p><ul><li><strong>Fixed a bug with user permissions.</strong></li></ul>]]></description>
    </item>
    <item>
      <title>ADFS Module 2.0.0</title>
      <link>https://www.mideye.com/release-notes/adfs/#release-adfs-2-0-0</link>
      <guid isPermaLink="false">https://www.mideye.com/release-notes/adfs/#release-adfs-2-0-0</guid>
      <pubDate>Thu, 01 Jan 1970 00:00:00 GMT</pubDate>
      <category>ADFS Module</category>
      <description><![CDATA[<p><em>feature</em></p><ul><li><strong>Added functionality to set necessary registry and event viewer permissions when starting ADFS Configuration Tool.</strong></li></ul><p><em>bugfix</em></p><ul><li><strong>Fixed a bug with user permissions.</strong></li></ul>]]></description>
    </item>
  </channel>
</rss>
