By Zach DeMeyer Posted May 22, 2019
Welcome to JumpCloud’s May Newsletter. In this issue, we have a Premium Support survey; product updates regarding RADIUS MFA, SAML SP metadata, and more; new Windows Policies; and a recap of our OpenVPN partnership webinar.
Coming Soon: Premium Support
We are pleased to announce that we will soon be adding Premium Support as a new JumpCloud service. As we finalize this offering, we would appreciate your feedback by taking our survey below. Our goal is to create the best Premium Support offering possible.
The survey will ask for your feedback on areas such as:
- 24/7/365 phone support
- Implementation and onboarding assistance
- Feature Training
- Dedicated Account Management
Thank you for taking the time to help us build the best Premium Support offering for our customers.
Announcing MFA for RADIUS
RADIUS is a great way to secure network access in your organization by using individual credentials instead of shared credentials. Adding an additional factor of verification to your username and password ensures tighter control over how it’s accessed, especially for VPN networks.
That’s why we have introduced MFA for RADIUS as a new Early Access feature, with General Availability set for early next month. With this release, admins will be able to enforce MFA for RADIUS across their entire user base, adding an additional factor to improve network security. Like all JumpCloud MFA offerings, users can leverage TOTP tokens generated by apps like Google Authenticator.
If you want to learn more about MFA for RADIUS or are interested in being a candidate for Early Access testing, please your account manager.
Product Update: SAML Service Provider Metadata Upload
Admins want the task of connecting SSO applications to JumpCloud to be fast and easy. The new SAML Service Provider (SP) metadata upload feature is designed to simplify and speed up the SAML application connection process.
When admins create a new SSO connection, they can attach an XML file containing application metadata into JumpCloud. The to-be-connected SSO app will be pre-populated instantly with configuration information.
With this release, the work required to initiate a SAML-connected application is reduced significantly. This update is also intended to reduce any potential confusion created when populating information into a SAML connector in JumpCloud.
New Windows Policies: Log On Screen, Defender, and Device Installation Policies
Ensure that JumpCloud-managed Windows systems are secure by leveraging our Policies framework. We have been actively working to expand on our Windows Policies offering. As part of this work, we have added a new policy to our platform, with more coming in the following week.
- Log On Screen Policy – This policy provides you with the ability to configure a myriad of settings surrounding the log on screen for targeted Windows devices.
Policies Coming Soon:
- Windows Defender – Gain better control over your fleet of systems through our Windows Defender policy. This policy will allow you to configure the behavior for the Windows Defender application. Through this policy, you will be able to help ensure that your systems are secure and virus free.
- Device Installation – With the Device Installation policy, you will be able to configure the behavior of targeted devices when drivers are installed.
Read about the new Policy, along with the rest of our current library of Policies, at our Knowledge Base.
macOS FileVault and GID Behavior Changes
As of JumpCloud agent version 0.10.60, users will no longer be removed from FileVault when their password expires. This agent update is a part of a larger initiative to improve end-user experience for password expiration, ensuring that accounts with expired passwords can be more easily recovered and reset.
We will also be updating the default primary group for JumpCloud created users on Mac systems in the next couple of weeks. Moving forward, if a GID is not specified for a user and they are bound to a Mac system, they’ll be added to the Staff group and will have a primary GID of 20. This change is driven to help ensure that JumpCloud created users are provisioned to match locally created users.
JumpCloud + OpenVPN Webinar Recap
Last month, JumpCloud and OpenVPN announced a product integration allowing customers to manage VPN access through either the LDAP or RADIUS protocol in Directory-as-a-Service.
Read about it here:
- Integrating OpenVPN Access Server 2.61 using JumpCloud RADIUS-as-a-Service
- Integrating OpenVPN Access Server 2.61 using JumpCloud LDAP-as-a-Service
Learn more by watching last week’s webinar, Securing VPN Authentication from the Cloud, which contains the first public demo of JumpCloud and OpenVPN in action.
We also had the privilege to interview the Director of Technology at Augeo Fi, who told us about how they’ve been using JumpCloud and OpenVPN in tandem. You can read the case study at the link below.