Skip to content

Commit

Permalink
website/docs: fix release notes to say Federation (goauthentik#11889)
Browse files Browse the repository at this point in the history
* fix Federation

* typo

* added back should

* slooooow down

---------

Co-authored-by: Tana M Berry <[email protected]>
  • Loading branch information
tanberry and Tana M Berry authored Nov 1, 2024
1 parent f192690 commit c24b619
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions website/docs/releases/2024/v2024.10.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,9 +6,9 @@ slug: "/releases/2024.10"
## Highlights

- **Chrome Device Trust** <span class="badge badge--primary">Enterprise</span> <span class="badge badge--info">Preview</span>: Verify that your users are logging in from managed devices and validate the devices' compliance with company policies.
- **FIPS/FAL3 for FedRAMP "very high" compliance** <span class="badge badge--primary">Enterprise+</span>: with support for SAML encryption and now JWE (JSON Web Encryption) support, authentik can now be configured for FIPS compliance at Federal Assurance Level (FAL) 3.
- **FIPS/FAL3 for FedRAMP "very high" compliance** <span class="badge badge--primary">Enterprise+</span>: with support for SAML encryption and now JWE (JSON Web Encryption) support, authentik can now be configured for FIPS compliance at Federation Assurance Level (FAL) 3.
- **Captcha on Identification stage**: Run a CAPTCHA process in the background while the user is entering their identification.
- **Kerberos source**: authentik can now integrate with existing Kerberos environments by allowing users to log in with their Kerberos credentials, SPNEGO or syncing users into authentik.
- **Kerberos source**: authentik can now integrate with existing Kerberos environments by allowing users to log in with their Kerberos credentials, SPNEGO, or syncing users into authentik.

## Breaking changes

Expand All @@ -34,7 +34,7 @@ We have no breaking changes this release!

- **Autoselect 2FA device**

Users who configure multiple 2FA devices will now land on their last used device's prompt, skipping the device picker. This will hopefually result in lower total average time per flow for the end user.
Users who configure multiple 2FA devices will now land on their last used device's prompt, skipping the device picker. This should result in lower total average time per flow for the end user.

- **New structure for authentik's technical documentation**

Expand Down

0 comments on commit c24b619

Please sign in to comment.