Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Release 17.2.0 #51146

Merged
merged 2 commits into from
Jan 22, 2025
Merged

Release 17.2.0 #51146

merged 2 commits into from
Jan 22, 2025

Conversation

camscale
Copy link
Contributor

@camscale camscale commented Jan 17, 2025

17.2.0 (01/21/2025)

This PR includes a e ref update.

Per-session MFA via IdP

Teleport users can now satisfy per-session MFA checks by authenticating with an
external identity provider as an alternative to using second factors registered
with Teleport.

GitHub access

Teleport now natively supports GitHub access allowing users to transparently
interact with Github with RBAC and audit logging support.

Oracle Toad client support

Oracle Database Access users can now use Toad GUI client.

Trusted clusters support for Kubernetes operator

Kubernetes operator users can now create trusted clusters using Kubernetes
custom resources.

Other improvements and fixes

  • Fixed WebAuthn attestation for Windows Hello. #51247
  • Include invited and reason fields in SessionStartEvents. #51175
  • Updated Go to 1.23.5. #51172
  • Fixed client tools auto-updates executed by aliases (causes recursive alias error). #51154
  • Support proxying Git commands for github.com. #51086
  • Assuming an Access Request in Teleport Connect now propagates elevated permissions to already opened Kubernetes tabs. #51055
  • Fixed AWS SigV4 parse errors in app access when the application omits the optional spaces between the SigV4 components. #51043
  • Fixed a Database Service bug where db_service.resources.aws.assume_role_arn settings could affect non-AWS dynamic databases or incorrectly override db_service.aws.assume_role_arn settings. #51039
  • Adds support for defining labels in the web UI Discover flows for single resource enroll (server, AWS and web applications, Kubernetes, EKS, RDS). #51038
  • Added support for using multi-port TCP apps in Teleport Connect without VNet. #51014
  • Fix naming conflict of DynamoDB audit event auto scaling policy. #50990
  • Prevent routing issues for agentless nodes that are created with non-UUID metadata.name fields. #50924
  • Honor the cluster routing strategy when client initiated host resolution via proxy templates or label matching is ambiguous. #50799
  • Emit audit events on access request expiry. #50775
  • Add full SSO MFA support for the WebUI. #50529

Enterprise:

  • Oracle: accept database certificates configuration used by Teleport Connect.

@camscale camscale added the no-changelog Indicates that a PR does not require a changelog entry label Jan 17, 2025
@github-actions github-actions bot requested a review from hugoShaka January 17, 2025 03:17
@camscale camscale added this pull request to the merge queue Jan 22, 2025
Merged via the queue into branch/v17 with commit 43a9972 Jan 22, 2025
42 of 43 checks passed
@camscale camscale deleted the release/17.2.0 branch January 22, 2025 02:18
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport helm no-changelog Indicates that a PR does not require a changelog entry size/sm
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants