# Release Notes

For a summarized view of monthly changes, see the Monthly Recap.

<table data-full-width="false"><thead><tr><th width="113.33984375">Date</th><th width="98.671875">Software</th><th width="91.91015625">Version</th><th>Description</th></tr></thead><tbody><tr><td>2026-04-17</td><td>Control Plane</td><td>126.22.0</td><td>This release fixes an issue where in an organization configured with an idle timeout and MFA, after the idle timeout locks the StrongDM client, unlocking the client by performing MFA would cause the client to immediately lock again. This occurred because the idle timeout was not reset on unlock.</td></tr><tr><td>2026-04-15</td><td>Control Plane</td><td>126.12.0</td><td>This release addresses a server-side issue where a failure to store policy authorization queries to a misconfigured Log Stream destination would sometimes retry indefinitely rather than failing and sending a warning notification email to the organization admin.</td></tr><tr><td>2026-04-09</td><td>Desktop Application</td><td>24.2.0</td><td>This release fixes a regression in desktop app version 23.99.0 or higher, where the application would fail to start due to missing static files.</td></tr><tr><td>2026-04-07</td><td>CLI</td><td>54.0.0</td><td>This release updates the CLI to suppress connection error notifications caused by the user cancelling the connection request.</td></tr><tr><td>2026-03-31</td><td>Control Plane</td><td>125.75.0</td><td>This release verifies support for MySQL 8.4.8 against 8.0.33 and 8.4.8 command-line clients, as well as verifies support for MySQL 9.6.0 against 8.0.33, 8.4.8, and 9.6.0 command-line clients.</td></tr><tr><td>2026-03-30</td><td>Control Plane</td><td>125.70.0</td><td>This release updates table filters styling.</td></tr><tr><td>2026-03-20</td><td>CLI</td><td>53.80.0</td><td>This release fixes an issue in the desktop app where errors during an "Update <code>kubectl</code> configuration" action would not be surfaced and could only be seen by running the <code>sdm k8s update-config</code> CLI command.</td></tr><tr><td>2026-03-20</td><td>Control Plane</td><td>125.27.0</td><td>This release adds support for using MCP Gateway with the Claude Desktop app.</td></tr><tr><td>2026-03-19</td><td>Control Plane</td><td>125.25.0</td><td>This release adds <code>granted-entitlements</code> and <code>requestable-entitlements</code> subcommands to <code>sdm admin clouds</code>, <code>sdm admin clusters</code>, <code>sdm admin kubernetes</code>, <code>sdm admin websites</code>, <code>sdm admin servers</code>, <code>sdm admin rdp</code>, and <code>sdm admin ssh</code>. These commands support <code>--filter</code>, <code>--filter-json</code>, <code>--filters-help</code>, <code>--extended</code>, <code>--json</code>, and <code>--timeout</code> flags.</td></tr><tr><td>2026-03-19</td><td>CLI</td><td>53.79.0</td><td>This release adds <code>granted-entitlements</code> and <code>requestable-entitlements</code> subcommands to <code>sdm admin clouds</code>, <code>sdm admin clusters</code>, <code>sdm admin kubernetes</code>, <code>sdm admin websites</code>, <code>sdm admin servers</code>, <code>sdm admin rdp</code>, and <code>sdm admin ssh</code>. These commands support <code>--filter</code>, <code>--filter-json</code>, <code>--filters-help</code>, <code>--extended</code>, <code>--json</code>, and <code>--timeout</code> flags.</td></tr><tr><td>2026-03-18</td><td>Control Plane</td><td>125.18.0</td><td>Fixed issue where pages were not loading properly for user's identity aliases when there was a large number of them.</td></tr><tr><td>2026-03-17</td><td>CLI</td><td>53.77.0</td><td>This release adds <code>sdm admin users requestable-entitlements</code>, <code>sdm admin resources requestable-entitlements</code>, and <code>sdm admin roles requestable-entitlements</code> commands for listing resources that can be requested via an access workflow. These commands support <code>--filter</code>, <code>--filter-json</code>, <code>--filters-help</code>, <code>--extended</code>, <code>--json</code>, and <code>--timeout</code> flags.</td></tr><tr><td>2026-03-17</td><td>Control Plane</td><td>125.13.0</td><td>This release adds <code>sdm admin users requestable-entitlements</code>, <code>sdm admin resources requestable-entitlements</code>, and <code>sdm admin roles requestable-entitlements</code> commands for listing resources that can be requested via an access workflow. These commands support <code>--filter</code>, <code>--filter-json</code>, <code>--filters-help</code>, <code>--extended</code>, <code>--json</code>, and <code>--timeout</code> flags.</td></tr><tr><td>2026-03-12</td><td>Control Plane</td><td>124.96.0</td><td>This release adds support in the Go, Java, Python, and Ruby SDKs for listing requestable account, resource, and role entitlements.</td></tr><tr><td>2026-03-12</td><td>Java SDK</td><td>16.21.0</td><td>This release adds support in the Go, Java, Python, and Ruby SDKs for listing requestable account, resource, and role entitlements.</td></tr><tr><td>2026-03-12</td><td>Python SDK</td><td>16.21.0</td><td>This release adds support in the Go, Java, Python, and Ruby SDKs for listing requestable account, resource, and role entitlements.</td></tr><tr><td>2026-03-12</td><td>Ruby SDK</td><td>16.21.0</td><td>This release adds support in the Go, Java, Python, and Ruby SDKs for listing requestable account, resource, and role entitlements.</td></tr><tr><td>2026-03-12</td><td>Go SDK</td><td>16.21.0</td><td>This release adds support in the Go, Java, Python, and Ruby SDKs for listing requestable account, resource, and role entitlements.</td></tr><tr><td>2026-03-12</td><td>Control Plane</td><td>124.92.0</td><td>This release introduces a new MCP Gateway resource that enables connections to remote MCP servers with fine-grained Cedar policies for controlling MCP tool calls. Authentication modes include OAuth, which uses a user token obtained via OAuth; PAT, which uses a Personal Access Token (Bearer token); and NoAuth, for servers that do not require authorization.</td></tr><tr><td>2026-03-12</td><td>CLI</td><td>53.66.0</td><td>This release introduces a new MCP Gateway resource that enables connections to remote MCP servers with fine-grained Cedar policies for controlling MCP tool calls. Authentication modes include OAuth, which uses a user token obtained via OAuth; PAT, which uses a Personal Access Token (Bearer token); and NoAuth, for servers that do not require authorization.</td></tr><tr><td>2026-03-12</td><td>Java SDK</td><td>16.20.0</td><td>This release introduces a new MCP Gateway resource that enables connections to remote MCP servers with fine-grained Cedar policies for controlling MCP tool calls. Authentication modes include OAuth, which uses a user token obtained via OAuth; PAT, which uses a Personal Access Token (Bearer token); and NoAuth, for servers that do not require authorization.</td></tr><tr><td>2026-03-12</td><td>Python SDK</td><td>16.20.0</td><td>This release introduces a new MCP Gateway resource that enables connections to remote MCP servers with fine-grained Cedar policies for controlling MCP tool calls. Authentication modes include OAuth, which uses a user token obtained via OAuth; PAT, which uses a Personal Access Token (Bearer token); and NoAuth, for servers that do not require authorization.</td></tr><tr><td>2026-03-12</td><td>Ruby SDK</td><td>16.20.0</td><td>This release introduces a new MCP Gateway resource that enables connections to remote MCP servers with fine-grained Cedar policies for controlling MCP tool calls. Authentication modes include OAuth, which uses a user token obtained via OAuth; PAT, which uses a Personal Access Token (Bearer token); and NoAuth, for servers that do not require authorization.</td></tr><tr><td>2026-03-12</td><td>Go SDK</td><td>16.20.0</td><td>This release introduces a new MCP Gateway resource that enables connections to remote MCP servers with fine-grained Cedar policies for controlling MCP tool calls. Authentication modes include OAuth, which uses a user token obtained via OAuth; PAT, which uses a Personal Access Token (Bearer token); and NoAuth, for servers that do not require authorization.</td></tr><tr><td>2026-03-11</td><td>Control Plane</td><td>124.90.0</td><td>This release fixes an issue where resources granted to a user by a temporary account grant (that is, an admin assignment or via an access request) would appear in the desktop app prior to the account grant's start time. This issue was purely cosmetic and would not have allowed access to connect to the resource if the user attempted to do so.</td></tr><tr><td>2026-03-11</td><td>CLI</td><td>53.60.0</td><td>This release fixes an issue in the RDP (Certificate Based) resource type where the RDP protocol interpreter could incorrectly parse data associated with non-virtual channels as virtual channel data. In rare cases, this could potentially lead to undefined behavior, including node crashes or unexpectedly high memory usage.</td></tr><tr><td>2026-03-10</td><td>Control Plane</td><td>124.71.0</td><td>This release fixes an issue where the policy editor could not save.</td></tr><tr><td>2026-03-09</td><td>Control Plane</td><td>124.68.0</td><td>This release adds <code>sdm admin users granted-entitlements</code>, <code>sdm admin resources granted-entitlements</code>, and <code>sdm admin roles granted-entitlements</code> commands for listing access entitlements. These commands support <code>--filter</code>, <code>--filter-json</code>, <code>--filters-help</code>, <code>--extended</code>, <code>--json</code>, and <code>--timeout</code> flags.</td></tr><tr><td>2026-03-09</td><td>CLI</td><td>53.55.0</td><td>This release adds <code>sdm admin users granted-entitlements</code>, <code>sdm admin resources granted-entitlements</code>, and <code>sdm admin roles granted-entitlements</code> commands for listing access entitlements. These commands support <code>--filter</code>, <code>--filter-json</code>, <code>--filters-help</code>, <code>--extended</code>, <code>--json</code>, and <code>--timeout</code> flags.</td></tr><tr><td>2026-03-09</td><td>CLI</td><td>53.54.0</td><td><ul><li>Disk usage information is now reported in diagnostics.</li></ul></td></tr><tr><td>2026-03-05</td><td>CLI</td><td>53.46.0</td><td>This release updates AccountGrant to include an <code>access_request_id</code> field. When an account grant is created through an access request workflow, this field will contain the ID of the originating access request. For grants created directly by an admin, this field will be empty.</td></tr><tr><td>2026-03-05</td><td>Python SDK</td><td>16.17.0</td><td>This release updates AccountGrant to include an <code>access_request_id</code> field. When an account grant is created through an access request workflow, this field will contain the ID of the originating access request. For grants created directly by an admin, this field will be empty.</td></tr><tr><td>2026-03-05</td><td>Ruby SDK</td><td>16.17.0</td><td>This release updates AccountGrant to include an <code>access_request_id</code> field. When an account grant is created through an access request workflow, this field will contain the ID of the originating access request. For grants created directly by an admin, this field will be empty.</td></tr><tr><td>2026-03-05</td><td>Java SDK</td><td>16.17.0</td><td>This release updates AccountGrant to include an <code>access_request_id</code> field. When an account grant is created through an access request workflow, this field will contain the ID of the originating access request. For grants created directly by an admin, this field will be empty.</td></tr><tr><td>2026-03-05</td><td>Go SDK</td><td>16.17.0</td><td>This release updates AccountGrant to include an <code>access_request_id</code> field. When an account grant is created through an access request workflow, this field will contain the ID of the originating access request. For grants created directly by an admin, this field will be empty.</td></tr><tr><td>2026-03-04</td><td>CLI</td><td>53.43.0</td><td>This release contains no announceable changes for customers</td></tr><tr><td>2026-03-03</td><td>Control Plane</td><td>124.26.0</td><td>This release fixes an issue where groups (privileges) requestable or granted within a given Entra ID or Okta Groups resource would not display in the said resource's Entitlements page.</td></tr><tr><td>2026-03-03</td><td>Control Plane</td><td>124.27.0</td><td>This release fixes an issue where updating the Okta Org URL would not update the link that appears in the desktop app. In addition, this release fixes an issue where the privileges dropdown contained groups that could not have their membership manipulated.</td></tr><tr><td>2026-03-03</td><td>Control Plane</td><td>124.20.0</td><td>This release adds support for Databricks SQL.</td></tr><tr><td>2026-03-03</td><td>CLI</td><td>53.37.0</td><td>This release adds support for Databricks SQL.</td></tr><tr><td>2026-03-03</td><td>Terraform Provider</td><td>16.15.0</td><td>This release adds support for Databricks SQL.</td></tr><tr><td>2026-03-03</td><td>Java SDK</td><td>16.15.0</td><td>This release adds support for Databricks SQL.</td></tr><tr><td>2026-03-03</td><td>Python SDK</td><td>16.15.0</td><td>This release adds support for Databricks SQL.</td></tr><tr><td>2026-03-03</td><td>Go SDK</td><td>16.15.0</td><td>This release adds support for Databricks SQL.</td></tr><tr><td>2026-02-26</td><td>Control Plane</td><td>123.97.0</td><td>This release adds <strong>Entitlements > Read</strong> as a grantable permission when creating admin tokens and API keys. This permission is required to use the new <code>GrantedAccountEntitlements</code>, <code>GrantedResourceEntitlements</code>, and <code>GrantedRoleEntitlements</code> services.</td></tr><tr><td>2026-02-26</td><td>Control Plane</td><td>123.95.0</td><td>This release adds support in the Go, Java, Python, and Ruby SDKs for listing granted account, resource, and role entitlements.</td></tr><tr><td>2026-02-26</td><td>Java SDK</td><td>16.13.0</td><td>This release adds support in the Go, Java, Python, and Ruby SDKs for listing granted account, resource, and role entitlements.</td></tr><tr><td>2026-02-26</td><td>Python SDK</td><td>16.13.0</td><td>This release adds support in the Go, Java, Python, and Ruby SDKs for listing granted account, resource, and role entitlements.</td></tr><tr><td>2026-02-26</td><td>Go SDK</td><td>16.13.0</td><td>This release adds support in the Go, Java, Python, and Ruby SDKs for listing granted account, resource, and role entitlements.</td></tr><tr><td>2026-02-26</td><td>Ruby SDK</td><td>16.13.0</td><td>This release adds support in the Go, Java, Python, and Ruby SDKs for listing granted account, resource, and role entitlements.</td></tr><tr><td>2026-02-26</td><td>Control Plane</td><td>123.88.0</td><td>This release adds the Okta Groups resource type.</td></tr><tr><td>2026-02-26</td><td>CLI</td><td>53.30.0</td><td>This release adds the <code>oktaGroups</code> resource type.</td></tr><tr><td>2026-02-26</td><td>Terraform Provider</td><td>16.12.0</td><td>This release adds the <code>oktaGroups</code> resource type.</td></tr><tr><td>2026-02-26</td><td>Java SDK</td><td>16.12.0</td><td>This release adds the <code>oktaGroups</code> resource type.</td></tr><tr><td>2026-02-26</td><td>Ruby SDK</td><td>16.12.0</td><td>This release adds the <code>oktaGroups</code> resource type.</td></tr><tr><td>2026-02-26</td><td>Python SDK</td><td>16.12.0</td><td>This release adds the <code>oktaGroups</code> resource type.</td></tr><tr><td>2026-02-26</td><td>Go SDK</td><td>16.12.0</td><td>This release adds the <code>oktaGroups</code> resource type.</td></tr><tr><td>2026-02-19</td><td>CLI</td><td>53.17.0</td><td>This release fixes an issue where external UPNs (containing <code>#EXT#</code>) were not URL encoded when provisioning external grants, causing provisioning to fail.</td></tr><tr><td>2026-02-19</td><td>Control Plane</td><td>123.48.0</td><td>This release fixes an issue where in the Jira plugin, request types were not populating correctly in the plugin settings when there were more than 50 projects.</td></tr><tr><td>2026-02-18</td><td>Control Plane</td><td>123.40.0</td><td>This release adds internal safeguards for audit query log retrieval under sparse-result, large-range scans to reduce control-plane load.</td></tr><tr><td>2026-02-13</td><td>Control Plane</td><td>123.17.0</td><td>This release fixes an issue where the Admin UI would hang when navigating away from the Utilization report while data was still loading.</td></tr><tr><td>2026-02-13</td><td>Control Plane</td><td>123.13.0</td><td>This release fixes an issue where navigating away from the Managed Secrets report while data is loading no longer causes the Admin UI to hang.</td></tr><tr><td>2026-02-13</td><td>Control Plane</td><td>123.11.0</td><td>This release fixes an issue where the Admin UI hangs when navigating away from the Access Workflows report while it is loading data.</td></tr><tr><td>2026-02-12</td><td>Control Plane</td><td>123.4.0</td><td>This release fixes an issue where discovered Entra and Okta groups would lose permission information when discovered a second time.</td></tr><tr><td>2026-02-12</td><td>Control Plane</td><td>122.99.0</td><td>This release fixes an issue where the Admin UI hangs when navigating away from the User Activity report while data is loading.</td></tr><tr><td>2026-02-12</td><td>Control Plane</td><td>122.93.0</td><td>This release updates the Admin UI to use all healthy nodes when node_selector is not defined. When a secret engine's node_selector is not defined, all nodes that are reporting that the secret engine is healthy will be taken into account when communicating with the secret engine. For backward compatibility, existing secret engines will have node_selector set to <code>tags:eng__{{name}}=true</code>, where <code>{{name}}</code> is the secret engine's name.</td></tr><tr><td>2026-02-12</td><td>Control Plane</td><td>122.92.0</td><td>This release revises the Authorize StrongDM action in the StrongDM app for Slack to work better for Slack enterprise customers with multiple workspaces.</td></tr><tr><td>2026-02-11</td><td>CLI</td><td>53.0.0</td><td>This release adds a <code>node_selector</code> field to secret engines that allows selecting which nodes communicate with the engine. If the node_selector is empty the old fallback mechanism is used with the selector set to <code>tags:eng__{{engine.name}}=true</code></td></tr><tr><td>2026-02-11</td><td>Control Plane</td><td>122.80.0</td><td>This release adds a <code>node_selector</code> field to secret engines that allows selecting which nodes communicate with the engine. If the node_selector is empty the old fallback mechanism is used with the selector set to <code>tags:eng__{{engine.name}}=true</code></td></tr><tr><td>2026-02-11</td><td>Java SDK</td><td>16.6.0</td><td>This release adds a <code>node_selector</code> field to secret engines that allows selecting which nodes communicate with the engine. If the node_selector is empty the old fallback mechanism is used with the selector set to <code>tags:eng__{{engine.name}}=true</code></td></tr><tr><td>2026-02-11</td><td>Ruby SDK</td><td>16.6.0</td><td>This release adds a <code>node_selector</code> field to secret engines that allows selecting which nodes communicate with the engine. If the node_selector is empty the old fallback mechanism is used with the selector set to <code>tags:eng__{{engine.name}}=true</code></td></tr><tr><td>2026-02-11</td><td>Python SDK</td><td>16.6.0</td><td>This release adds a <code>node_selector</code> field to secret engines that allows selecting which nodes communicate with the engine. If the node_selector is empty the old fallback mechanism is used with the selector set to <code>tags:eng__{{engine.name}}=true</code></td></tr><tr><td>2026-02-11</td><td>Go SDK</td><td>16.6.0</td><td>This release adds a <code>node_selector</code> field to secret engines that allows selecting which nodes communicate with the engine. If the node_selector is empty the old fallback mechanism is used with the selector set to <code>tags:eng__{{engine.name}}=true</code></td></tr><tr><td>2026-02-10</td><td>Control Plane</td><td>122.73.0</td><td><ul><li>[Fix] Resolves an issue where the app would seem to hang when navigating away from teh Standing Access report.</li></ul></td></tr><tr><td>2026-02-09</td><td>Control Plane</td><td>122.61.0</td><td>This release fixes an issue where navigating away from the Executive Summary report while it's in a loading state no longer "hangs" the Admin UI.</td></tr><tr><td>2026-02-09</td><td>Control Plane</td><td>122.59.0</td><td>This release fixes an issue where SSH replays were not playing.</td></tr><tr><td>2026-02-06</td><td>Control Plane</td><td>122.47.0</td><td>This release fixes an issue with hanging navigation when navigating away from the Auditor Insights report.</td></tr><tr><td>2026-02-06</td><td>Control Plane</td><td>122.44.0</td><td>This release adds BootDiskLicense, GKEClusterName, and GKENodePool to discovered GCP VM instance details.</td></tr><tr><td>2026-02-06</td><td>CLI</td><td>52.96.0</td><td>This release adds BootDiskLicense, GKEClusterName, and GKENodePool to discovered GCP VM instance details.</td></tr><tr><td>2026-02-04</td><td>Control Plane</td><td>122.30.0</td><td>This release fixes an issue that prevented discovered Entra Groups from having any extra information associated with them.</td></tr><tr><td>2026-02-04</td><td>CLI</td><td>52.92.0</td><td>This release fixes an issue in the Azure discovery scanner that was causing scan failures when a list of subscription IDs was specified in the connector.</td></tr><tr><td>2026-02-04</td><td>Control Plane</td><td>122.27.0</td><td>This release adds Terraform provider datasource "sdm_org_url_info" to return Organization settings.</td></tr><tr><td>2026-02-04</td><td>Terraform Provider</td><td>16.5.0</td><td>This release adds Terraform provider datasource "sdm_org_url_info" to return Organization settings.</td></tr><tr><td>2026-02-04</td><td>Java SDK</td><td>16.5.0</td><td>This release adds Terraform provider datasource "sdm_org_url_info" to return Organization settings.</td></tr><tr><td>2026-02-04</td><td>Python SDK</td><td>16.5.0</td><td>This release adds Terraform provider datasource "sdm_org_url_info" to return Organization settings.</td></tr><tr><td>2026-02-04</td><td>Ruby SDK</td><td>16.5.0</td><td>This release adds Terraform provider datasource "sdm_org_url_info" to return Organization settings.</td></tr><tr><td>2026-02-04</td><td>Go SDK</td><td>16.5.0</td><td>This release adds Terraform provider datasource "sdm_org_url_info" to return Organization settings.</td></tr><tr><td>2026-02-02</td><td>CLI</td><td>52.88.0</td><td>This release updates proxy workers to include their hostname in connection error messages. Connection error messages now include the address of the proxy cluster used for the connection. Gateway diagnostics now report "N/A" when no gateways are present.</td></tr><tr><td>2026-01-29</td><td>CLI</td><td>52.85.0</td><td>This release exposes the user employee number via the SDKs and Terraform, along with resource discovery information for Okta groups via the SDKs, Terraform, and CLI.</td></tr><tr><td>2026-01-29</td><td>Terraform Provider</td><td>16.3.0</td><td>This release exposes the user employee number via the SDKs and Terraform, along with resource discovery information for Okta groups via the SDKs, Terraform, and CLI.</td></tr><tr><td>2026-01-29</td><td>Python SDK</td><td>16.3.0</td><td>This release exposes the user employee number via the SDKs and Terraform, along with resource discovery information for Okta groups via the SDKs, Terraform, and CLI.</td></tr><tr><td>2026-01-29</td><td>Java SDK</td><td>16.3.0</td><td>This release exposes the user employee number via the SDKs and Terraform, along with resource discovery information for Okta groups via the SDKs, Terraform, and CLI.</td></tr><tr><td>2026-01-29</td><td>Ruby SDK</td><td>16.3.0</td><td>This release exposes the user employee number via the SDKs and Terraform, along with resource discovery information for Okta groups via the SDKs, Terraform, and CLI.</td></tr><tr><td>2026-01-29</td><td>Go SDK</td><td>16.3.0</td><td>This release exposes the user employee number via the SDKs and Terraform, along with resource discovery information for Okta groups via the SDKs, Terraform, and CLI.</td></tr><tr><td>2026-01-29</td><td>Control Plane</td><td>121.90.0</td><td>For Slack enterprise grid connections to the StrongDM app, the Connected Services page now displays the list of workspaces that are currently connected to the app at Slack. If there are no connected workspaces at Slack, we provide a link to the page there where that can be done.</td></tr><tr><td>2026-01-29</td><td>Control Plane</td><td>121.85.0</td><td>This release fixes an issue where local port overrides would sometimes not be reflected in the desktop app.</td></tr><tr><td>2026-01-28</td><td>Control Plane</td><td>121.78.0</td><td>This release adds support for the <code>Employee Number</code> field in User settings.</td></tr><tr><td>2026-01-26</td><td>Control Plane</td><td>121.56.0</td><td>This release addresses an auth loop issue experienced by Slack Enterprise customers where a single StrongDM user may have multiple Slack user IDs.</td></tr><tr><td>2026-01-23</td><td>Control Plane</td><td>121.43.0</td><td>This release adds support for the <code>employee_number</code> field in the <code>sdm admin users</code> CLI tree.</td></tr><tr><td>2026-01-23</td><td>CLI</td><td>52.78.0</td><td>This release adds support for the <code>employee_number</code> field in the <code>sdm admin users</code> CLI tree.</td></tr><tr><td>2026-01-21</td><td>Control Plane</td><td>121.25.0</td><td>This release fixes an issue where secret logs were being prepended to the table even if it mismatched the active filter.</td></tr><tr><td>2026-01-20</td><td>Desktop Application</td><td>23.74.0</td><td>We’ve modernized the desktop app to make it faster, more reliable, and easier to use. Resources are now shown in a single, streamlined list with filtering options for type and health status. Revisions to the Windows installer simplify setup and align MSI installs with the EXE installer. Behind the scenes, a major architectural upgrade improves stability, makes navigation smoother, and sets the stage for quicker, more seamless innovation in future releases.</td></tr><tr><td>2026-01-17</td><td>Control Plane</td><td>121.0.0</td><td>This release changes the way access requests are loaded and significantly improves the performance of the Requests > All Requests page of the Admin UI.</td></tr><tr><td>2026-01-15</td><td>Control Plane</td><td>120.88.0</td><td>This release fixes an issue introduced in server version 120.81.0 that caused some customers to lose access to the Access Workflows page of the Admin UI with a message that they were missing the required SKU.</td></tr><tr><td>2026-01-15</td><td>Control Plane</td><td>120.84.0</td><td>This release updates the Group members table in the Admin UI so it no longer infinitely loads.</td></tr><tr><td>2026-01-15</td><td>CLI</td><td>52.65.0</td><td>This release adds support for the "reason" field in access request approvals/denials. In addition, it ensures approver notifications are sent even if the requester lacks Slack integration or user configuration.</td></tr><tr><td>2026-01-15</td><td>Control Plane</td><td>120.77.0</td><td>This release adds support for the "reason" field in access request approvals/denials. In addition, it ensures approver notifications are sent even if the requester lacks Slack integration or user configuration.</td></tr><tr><td>2026-01-14</td><td>Control Plane</td><td>120.72.0</td><td>This release updates the Admin UI so that admins are no longer shown an "Assign members" button on managed groups when there are no current members.</td></tr><tr><td>2026-01-14</td><td>Control Plane</td><td>120.70.0</td><td>This release updates the proxy cluster list and detail pages to display version information.</td></tr><tr><td>2026-01-14</td><td>Control Plane</td><td>120.64.0</td><td>This release updates the Admin UI so that Auditors are no longer presented with a disconnect button on the connected services tab on the Integrations page.</td></tr><tr><td>2026-01-14</td><td>CLI</td><td>52.58.0</td><td>This release fixes an issue where connecting to Oracle resources would fail when warning messages were returned by the Oracle server during authentication. This could happen, for example, when the password of the configured Oracle user was in an expiry grace period, among other reasons. Warning messages are now correctly decoded if present during the Oracle authentication handshake and passed through to the connecting client.</td></tr><tr><td>2026-01-12</td><td>Control Plane</td><td>120.43.0</td><td>This release updates the Admin UI Groups table's "Managed By" filter to have more options in addition to SCIM provisioning.</td></tr><tr><td>2026-01-12</td><td>Control Plane</td><td>120.38.0</td><td>This release fixes an issue that prevented Slack Enterprise Grid users who authorized in a different workspace from the bot's installation from being found during user lookups.</td></tr><tr><td>2026-01-12</td><td>Control Plane</td><td>120.35.0</td><td>This release changes the entities that are logged in the query log as part of an authorization decision. These entities will now be limited to just those related to the principal, action, resource and context of the request.</td></tr><tr><td>2026-01-12</td><td>CLI</td><td>52.55.0</td><td>This release updates the SDKs so that the managed secrets retrieve call does not require passing of a public key.</td></tr><tr><td>2026-01-12</td><td>Java SDK</td><td>15.45.0</td><td>This release updates the SDKs so that the managed secrets retrieve call does not require passing of a public key.</td></tr><tr><td>2026-01-12</td><td>Python SDK</td><td>15.45.0</td><td>This release updates the SDKs so that the managed secrets retrieve call does not require passing of a public key.</td></tr><tr><td>2026-01-12</td><td>Ruby SDK</td><td>15.45.0</td><td>This release updates the SDKs so that the managed secrets retrieve call does not require passing of a public key.</td></tr><tr><td>2026-01-12</td><td>Go SDK</td><td>15.45.0</td><td>This release updates the SDKs so that the managed secrets retrieve call does not require passing of a public key.</td></tr><tr><td>2026-01-09</td><td>CLI</td><td>52.53.0</td><td>This release fixes a permissions issue when using API keys to audit access requests. If the token does not have the <code>audit:users</code> permission, the name will simply be blank.</td></tr><tr><td>2026-01-09</td><td>Control Plane</td><td>120.21.0</td><td>This release allows ServiceNow request approvals to defer the start time to the time indicated by <code>startFrom</code>, formatted per <code>RFC3339</code>.</td></tr><tr><td>2026-01-08</td><td>Control Plane</td><td>120.19.0</td><td>This release updates interactive exec sessions for SSH and K8s to now result in ssh logs or k8s for commands entered during those sessions.</td></tr><tr><td>2026-01-08</td><td>Control Plane</td><td>120.10.0</td><td>This release fixes an issue that allowed temporary access to be granted to Microsoft Entra ID resources without including groups as privileges, or to groups that aren't valid.</td></tr><tr><td>2026-01-07</td><td>CLI</td><td>52.48.0</td><td>This release improves doctor diagnostics collection under exceptional conditions where some diagnostics collectors could previously take longer than the default collection timeout and result in no diagnostics being collected. Long-running collectors are now interrupted if collection takes too long, so the overall collection still succeeds.</td></tr><tr><td>2025-12-24</td><td>CLI</td><td>52.39.0</td><td>This release removes a limitation when connecting to RDP (Certificate Based) resources from clients that required smart card sharing/redirection to be explicitly disabled in the Windows Remote Desktop Connection and macOS Windows App RDP client connection settings in order to successfully log in to the RDP server. Connections to RDP resources now work regardless of whether the smart card sharing setting is enabled; any local smart cards present on the client are ignored and continue to be inaccessible on the remote RDP server.</td></tr><tr><td>2025-12-24</td><td>CLI</td><td>52.38.0</td><td>This release improves error reporting when an RDP server rejects the initial protocol negotiation.</td></tr><tr><td>2025-12-23</td><td>Ruby SDK</td><td>15.43.0</td><td>This release updates the Ruby SDK with several changes. Version 15.43.0 adds automatic encryption/decryption support for managed secret APIs. In addition, the ManagedSecret.value will be automatically encrypted using associated secret_engine key during create/update calls, and ManagedSecret.value will be automatically decrypted using automatically generated Private/Public key pair for Retrieve calls when the provided public_key is empty.</td></tr><tr><td>2025-12-23</td><td>Python SDK</td><td>15.43.0</td><td>This release updates the Python SDK with several changes. When creating or updating ManagedSecret its value should be an unencrypted JSON value. It will be automatically encrypted using secret engine's Public Key. When retrieving a secret there is no longer a need to generate an RSA private/public key pair. If the passed public_key value is empty, a new key will be automatically generated and used. This key will be used for any further secret retrievals using the same Client. The returned value doesn't need further decryption. It's already decrypted.</td></tr><tr><td>2025-12-22</td><td>CLI</td><td>52.34.0</td><td>This release updates the <code>sdm status</code> CLI command to output a warning to <code>stderr</code> when it cannot detect a running StrongDM listener service.</td></tr><tr><td>2025-12-22</td><td>Control Plane</td><td>119.66.0</td><td>This release updates the Admin UI so that tokens can no longer be added to groups.</td></tr><tr><td>2025-12-22</td><td>Control Plane</td><td>119.65.0</td><td>This release modifies the labels of the entitlements CSV download to be more verbose.</td></tr><tr><td>2025-12-20</td><td>Control Plane</td><td>119.59.0</td><td>This release makes requestable entitlements generally available.</td></tr><tr><td>2025-12-20</td><td>CLI</td><td>52.31.0</td><td>This release improves the health check errors for RDP password resources for Network Level Authentication (NLA)-related errors. More informative detailed Windows error messages are now shown where previously only the numeric error code was shown.</td></tr><tr><td>2025-12-20</td><td>Control Plane</td><td>119.58.0</td><td>This release prevents API keys and admin tokens from being members of groups.</td></tr><tr><td>2025-12-19</td><td>Desktop Application</td><td>23.64.0</td><td>This release updates the Windows CLI location, Windows installer logging, and README files, and adds automatic PATH maintenance and stability improvements. The <code>sdm</code> CLI is now named <code>sdm.exe</code> and is located in <code>SDM\resources</code> (previously <code>sdm32.exe</code> or <code>sdm.amd64.exe</code>). The <code>resources</code> directory is added directly to PATH, so symlinks are no longer needed for the <code>sdm</code> command to work. In addition, the NSIS installer now writes detailed logs to <code>%TEMP%\sdm-install.log</code> for easier troubleshooting. Distribution packages now include README files with installation and uninstallation instructions. On Windows, the desktop app ensures the <code>sdm</code> command PATH is correct on every startup. Lastly, users who install without admin privileges no longer see a crash screen when the VNM service isn't installed.</td></tr><tr><td>2025-12-19</td><td>CLI</td><td>52.29.0</td><td>This release improves the health check error message for RDP resources when the configured user is not permitted to access the server via remote desktop. Previously this returned "bad credentials", when in fact this error indicates the credentials were correct but the user is denied access to remote desktop by policy and/or group membership. This now returns `User does not have permission to access the server'.</td></tr><tr><td>2025-12-19</td><td>CLI</td><td>52.26.0</td><td>This release updates the Go SDK with the following changes. When creating or updating ManagedSecret its Value should be an unencrypted JSON value. It will be automatically encrypted using the secret engine's Public Key. When retrieving a secret there is no longer a need to generate an RSA private/public key pair. If the passed <code>publicKey</code> value is empty, a new key will be automatically generated and used. This key will be used for any further secret retrievals using the same <code>Client</code>. The returned value doesn't need further decryption, as it is already decrypted.</td></tr><tr><td>2025-12-19</td><td>Go SDK</td><td>15.43.0</td><td>This release updates the Go SDK with the following changes. When creating or updating ManagedSecret its Value should be an unencrypted JSON value. It will be automatically encrypted using the secret engine's Public Key. When retrieving a secret there is no longer a need to generate an RSA private/public key pair. If the passed <code>publicKey</code> value is empty, a new key will be automatically generated and used. This key will be used for any further secret retrievals using the same <code>Client</code>. The returned value doesn't need further decryption, as it is already decrypted.</td></tr><tr><td>2025-12-18</td><td>Control Plane</td><td>119.40.0</td><td>This release adds functionality to link/unlink existing managed resources to discovered resources.</td></tr><tr><td>2025-12-17</td><td>Control Plane</td><td>119.24.0</td><td>This release fixes an issue on the Secrets page of the Admin UI, where the first created secret would not show up in the list.</td></tr><tr><td>2025-12-17</td><td>CLI</td><td>52.21.0</td><td>This release allows enabling resource lock on SSH servers.</td></tr><tr><td>2025-12-17</td><td>Control Plane</td><td>119.20.0</td><td>This release allows enabling resource lock on SSH servers.</td></tr><tr><td>2025-12-17</td><td>Terraform Provider</td><td>15.41.0</td><td>This release allows enabling resource lock on SSH servers.</td></tr><tr><td>2025-12-17</td><td>Java SDK</td><td>15.41.0</td><td>This release allows enabling resource lock on SSH servers.</td></tr><tr><td>2025-12-17</td><td>Go SDK</td><td>15.41.0</td><td>This release allows enabling resource lock on SSH servers.</td></tr><tr><td>2025-12-17</td><td>Python SDK</td><td>15.41.0</td><td>This release allows enabling resource lock on SSH servers.</td></tr><tr><td>2025-12-17</td><td>Ruby SDK</td><td>15.41.0</td><td>This release allows enabling resource lock on SSH servers.</td></tr><tr><td>2025-12-13</td><td>Control Plane</td><td>119.0.0</td><td>This release adds support for Discovery Connectors to the API.</td></tr><tr><td>2025-12-13</td><td>CLI</td><td>52.17.0</td><td>This release adds support for Discovery Connectors to the API.</td></tr><tr><td>2025-12-12</td><td>Go SDK</td><td>15.40.0</td><td>This release adds support for Discovery Connectors to the API.</td></tr><tr><td>2025-12-12</td><td>Terraform Provider</td><td>15.40.0</td><td>This release adds support for Discovery Connectors to the API.</td></tr><tr><td>2025-12-12</td><td>Ruby SDK</td><td>15.40.0</td><td>This release adds support for Discovery Connectors to the API.</td></tr><tr><td>2025-12-12</td><td>Java SDK</td><td>15.40.0</td><td>This release adds support for Discovery Connectors to the API.</td></tr><tr><td>2025-12-12</td><td>Python SDK</td><td>15.40.0</td><td>This release adds support for Discovery Connectors to the API.</td></tr><tr><td>2025-12-12</td><td>Control Plane</td><td>118.96.0</td><td>This release updates the Download CSV dropdown menu items to say "Export all granted rows".</td></tr><tr><td>2025-12-12</td><td>Terraform Provider</td><td>15.39.0</td><td>This release fixes an issue causing failures using groups via JSON.</td></tr><tr><td>2025-12-12</td><td>CLI</td><td>52.16.0</td><td>This fixes an issue where the wrong certificate would be used when connecting to an RDP (Certificate Based) resource when using NLA with a third-party CA.</td></tr><tr><td>2025-12-12</td><td>Control Plane</td><td>118.92.0</td><td>This release fixes an issue causing failures using groups via JSON.</td></tr><tr><td>2025-12-12</td><td>Java SDK</td><td>15.39.0</td><td>This release fixes an issue causing failures using groups via JSON.</td></tr><tr><td>2025-12-12</td><td>Python SDK</td><td>15.39.0</td><td>This release fixes an issue causing failures using groups via JSON.</td></tr><tr><td>2025-12-12</td><td>Ruby SDK</td><td>15.39.0</td><td>This release fixes an issue causing failures using groups via JSON.</td></tr><tr><td>2025-12-12</td><td>Go SDK</td><td>15.39.0</td><td>This release fixes an issue causing failures using groups via JSON.</td></tr><tr><td>2025-12-11</td><td>Control Plane</td><td>118.85.0</td><td>This release fixes an issue with reports sorting.</td></tr><tr><td>2025-12-11</td><td>CLI</td><td>52.13.0</td><td>Kubernetes driver fix for connections not closing when the API requests were done with "Connection: Close" header set.</td></tr><tr><td>2025-12-10</td><td>Control Plane</td><td>118.78.0</td><td>This release fixes an issue where the delete role button under Role Settings would disappear.</td></tr><tr><td>2025-12-10</td><td>Control Plane</td><td>118.77.0</td><td>This release fixes an issue when dragging a file over a drag and drop file input, such as the certificate fields in Cluster forms. The input now accepts the dropped file as input and outputs the contents of the file in the text area.</td></tr><tr><td>2025-12-09</td><td>Control Plane</td><td>118.64.0</td><td>This release addresses an issue that may cause user authorization in the StrongDM App for Slack to be ineffectual for users in the primary workspace of a connected Slack Enterprise Grid account.</td></tr><tr><td>2025-12-05</td><td>Control Plane</td><td>118.47.0</td><td>This release adds best-effort command parsing of SSH and Kubernetes exec sessions to Log Stream.</td></tr><tr><td>2025-12-04</td><td>Control Plane</td><td>118.35.0</td><td><p>Public notes appear on https://strongdm.com/docs. Leave blank if the change is not customer-facing, or if it is a feature that is not yet Generally Available. Do not write "None" or "N/A".</p><p>Examples: This release adds support for Neuralink. This release is incompatible with CLI versions below: vA.B.C This release patches the following third-party CVEs: CVE-1984-12345 --></p></td></tr><tr><td>2025-12-02</td><td>CLI</td><td>51.90.0</td><td>This release implements progressive scanning for discovery of GCP resources.</td></tr><tr><td>2025-12-01</td><td>CLI</td><td>51.89.0</td><td>When multiple AD DCs are configured for RDP Certificate resources for LDAP-based user SID lookup of Identity Aliases, the LDAP connections are now randomly distributed across the DCs to improve load balancing. Additionally, the connection timeout for LDAP has been shortened to ensure failover in the presence of a failed/unavailable DC.</td></tr><tr><td>2025-11-27</td><td>Control Plane</td><td>118.6.0</td><td>This release allows service accounts to request and manage access via the CLI and the <code>sdm access</code> command tree.</td></tr><tr><td>2025-11-27</td><td>CLI</td><td>51.86.0</td><td>This release allows service accounts to request and manage access via the CLI and the <code>sdm access</code> command tree.</td></tr><tr><td>2025-11-26</td><td>Control Plane</td><td>118.5.0</td><td>This release enables <code>type:postgres type:mysql</code> syntax to work like <code>id:1 id:2</code>, allowing (type1 or type2) and other_filters in a single clause. This release also changes Type string to Types []string following the existing ID field pattern.</td></tr><tr><td>2025-11-26</td><td>Control Plane</td><td>118.2.0</td><td>This release fixes an issue where access request reasons made entirely of whitespace characters was counted as providing a reason.</td></tr><tr><td>2025-11-26</td><td>Control Plane</td><td>117.98.0</td><td>This release updates the help text on the Secret Store field on resource forms for better clarity.</td></tr><tr><td>2025-11-26</td><td>CLI</td><td>51.85.0</td><td>This release adds support for Network Level Authentication (NLA) for RDP (Certificate Based) resources. NLA may now be enabled for new and existing RDP (Certificate Based) resources by configuring a new optional Server FQDN field in the resource as well as the DC Hostnames. Configuring these fields will cause new connections to those resources to perform NLA using Kerberos. This is only supported in on-premises Active Directory environments; using Microsoft Entra ID still requires that target Windows servers be configured to not require NLA. In addition, this release fixes an issue where creating or updating MySQL and PostgreSQL mTLS resources would incorrectly report a failure to validate the client certificate and key when storing those credentials in a secret store.</td></tr><tr><td>2025-11-26</td><td>Control Plane</td><td>117.97.0</td><td>This release adds support for Network Level Authentication (NLA) for RDP (Certificate Based) resources. NLA may now be enabled for new and existing RDP (Certificate Based) resources by configuring a new optional Server FQDN field in the resource as well as the DC Hostnames. Configuring these fields will cause new connections to those resources to perform NLA using Kerberos. This is only supported in on-premises Active Directory environments; using Microsoft Entra ID still requires that target Windows servers be configured to not require NLA. In addition, this release fixes an issue where creating or updating MySQL and PostgreSQL mTLS resources would incorrectly report a failure to validate the client certificate and key when storing those credentials in a secret store.</td></tr><tr><td>2025-11-26</td><td>Terraform Provider</td><td>15.35.0</td><td>This release adds support for Network Level Authentication (NLA) for RDP (Certificate Based) resources. NLA may now be enabled for new and existing RDP (Certificate Based) resources by configuring a new optional Server FQDN field in the resource as well as the DC Hostnames. Configuring these fields will cause new connections to those resources to perform NLA using Kerberos. This is only supported in on-premises Active Directory environments; using Microsoft Entra ID still requires that target Windows servers be configured to not require NLA. In addition, this release fixes an issue where creating or updating MySQL and PostgreSQL mTLS resources would incorrectly report a failure to validate the client certificate and key when storing those credentials in a secret store.</td></tr><tr><td>2025-11-26</td><td>Python SDK</td><td>15.35.0</td><td>This release adds support for Network Level Authentication (NLA) for RDP (Certificate Based) resources. NLA may now be enabled for new and existing RDP (Certificate Based) resources by configuring a new optional Server FQDN field in the resource as well as the DC Hostnames. Configuring these fields will cause new connections to those resources to perform NLA using Kerberos. This is only supported in on-premises Active Directory environments; using Microsoft Entra ID still requires that target Windows servers be configured to not require NLA. In addition, this release fixes an issue where creating or updating MySQL and PostgreSQL mTLS resources would incorrectly report a failure to validate the client certificate and key when storing those credentials in a secret store.</td></tr><tr><td>2025-11-26</td><td>Java SDK</td><td>15.35.0</td><td>This release adds support for Network Level Authentication (NLA) for RDP (Certificate Based) resources. NLA may now be enabled for new and existing RDP (Certificate Based) resources by configuring a new optional Server FQDN field in the resource as well as the DC Hostnames. Configuring these fields will cause new connections to those resources to perform NLA using Kerberos. This is only supported in on-premises Active Directory environments; using Microsoft Entra ID still requires that target Windows servers be configured to not require NLA. In addition, this release fixes an issue where creating or updating MySQL and PostgreSQL mTLS resources would incorrectly report a failure to validate the client certificate and key when storing those credentials in a secret store.</td></tr><tr><td>2025-11-26</td><td>Go SDK</td><td>15.35.0</td><td>This release adds support for Network Level Authentication (NLA) for RDP (Certificate Based) resources. NLA may now be enabled for new and existing RDP (Certificate Based) resources by configuring a new optional Server FQDN field in the resource as well as the DC Hostnames. Configuring these fields will cause new connections to those resources to perform NLA using Kerberos. This is only supported in on-premises Active Directory environments; using Microsoft Entra ID still requires that target Windows servers be configured to not require NLA. In addition, this release fixes an issue where creating or updating MySQL and PostgreSQL mTLS resources would incorrectly report a failure to validate the client certificate and key when storing those credentials in a secret store.</td></tr><tr><td>2025-11-26</td><td>Ruby SDK</td><td>15.35.0</td><td>This release adds support for Network Level Authentication (NLA) for RDP (Certificate Based) resources. NLA may now be enabled for new and existing RDP (Certificate Based) resources by configuring a new optional Server FQDN field in the resource as well as the DC Hostnames. Configuring these fields will cause new connections to those resources to perform NLA using Kerberos. This is only supported in on-premises Active Directory environments; using Microsoft Entra ID still requires that target Windows servers be configured to not require NLA. In addition, this release fixes an issue where creating or updating MySQL and PostgreSQL mTLS resources would incorrectly report a failure to validate the client certificate and key when storing those credentials in a secret store.</td></tr><tr><td>2025-11-24</td><td>Control Plane</td><td>117.86.0</td><td>This release adds support for managing EC2 instances, Azure VMs, and GCE instances on Windows platform as RDP resources in StrongDM.</td></tr><tr><td>2025-11-22</td><td>Control Plane</td><td>117.79.0</td><td>This release adds an email address under the user account name in the Resource Entitlements tab of the Admin UI and updates the behavior of the "Search accounts..." functionality to include email addresses as well as user names.</td></tr><tr><td>2025-11-21</td><td>Control Plane</td><td>117.72.0</td><td>This release sorts resource filters on their name instead of the database type alias.</td></tr><tr><td>2025-11-20</td><td>CLI</td><td>51.75.0</td><td>This release corrects an issue with connecting to Oracle resources using server or client character sets other than AL32UTF8 (the default) from the SQLPlus client. Previously such connections would fail with authentication errors.</td></tr><tr><td>2025-11-19</td><td>CLI</td><td>51.74.0</td><td>This release implements progressive scanning for discovery of AWS resources.</td></tr><tr><td>2025-11-19</td><td>Control Plane</td><td>117.50.0</td><td>This release introduces a new enterprise secret store type called StrongDM Vault. Additionally this release adds secret engines for managing database credentials for Microsoft SQL Server, MySQL/MariaDB, and PostgreSQL. Admin UI changes include the following: the Strong Vault secret store field on resource settings was renamed to Stored in StrongDM; and the Strong Vault secret store was removed from the secret stores list.</td></tr><tr><td>2025-11-19</td><td>CLI</td><td>51.73.0</td><td>This release introduces a new enterprise secret store type called StrongDM Vault. Additionally this release adds secret engines for managing database credentials for Microsoft SQL Server, MySQL/MariaDB, and PostgreSQL. Admin UI changes include the following: the Strong Vault secret store field on resource settings was renamed to Stored in StrongDM; and the Strong Vault secret store was removed from the secret stores list.</td></tr><tr><td>2025-11-19</td><td>Java SDK</td><td>15.33.0</td><td>This release introduces a new enterprise secret store type called StrongDM Vault. Additionally this release adds secret engines for managing database credentials for Microsoft SQL Server, MySQL/MariaDB, and PostgreSQL. Admin UI changes include the following: the Strong Vault secret store field on resource settings was renamed to Stored in StrongDM; and the Strong Vault secret store was removed from the secret stores list.</td></tr><tr><td>2025-11-19</td><td>Go SDK</td><td>15.33.0</td><td>This release introduces a new enterprise secret store type called StrongDM Vault. Additionally this release adds secret engines for managing database credentials for Microsoft SQL Server, MySQL/MariaDB, and PostgreSQL. Admin UI changes include the following: the Strong Vault secret store field on resource settings was renamed to Stored in StrongDM; and the Strong Vault secret store was removed from the secret stores list.</td></tr><tr><td>2025-11-19</td><td>Terraform Provider</td><td>15.33.0</td><td>This release introduces a new enterprise secret store type called StrongDM Vault. Additionally this release adds secret engines for managing database credentials for Microsoft SQL Server, MySQL/MariaDB, and PostgreSQL. Admin UI changes include the following: the Strong Vault secret store field on resource settings was renamed to Stored in StrongDM; and the Strong Vault secret store was removed from the secret stores list.</td></tr><tr><td>2025-11-19</td><td>Python SDK</td><td>15.33.0</td><td>This release introduces a new enterprise secret store type called StrongDM Vault. Additionally this release adds secret engines for managing database credentials for Microsoft SQL Server, MySQL/MariaDB, and PostgreSQL. Admin UI changes include the following: the Strong Vault secret store field on resource settings was renamed to Stored in StrongDM; and the Strong Vault secret store was removed from the secret stores list.</td></tr><tr><td>2025-11-19</td><td>Ruby SDK</td><td>15.33.0</td><td>This release introduces a new enterprise secret store type called StrongDM Vault. Additionally this release adds secret engines for managing database credentials for Microsoft SQL Server, MySQL/MariaDB, and PostgreSQL. Admin UI changes include the following: the Strong Vault secret store field on resource settings was renamed to Stored in StrongDM; and the Strong Vault secret store was removed from the secret stores list.</td></tr><tr><td>2025-11-17</td><td>Control Plane</td><td>117.39.0</td><td>This release updates the user access on the Catalog page for resources that have an account grant that starts in the future to have a status of "Granted by temporary access" rather than "Pending".</td></tr><tr><td>2025-11-14</td><td>Control Plane</td><td>117.32.0</td><td>This release fixes an issue where device trust status for new authentications would be unknown for up to a minute.</td></tr><tr><td>2025-11-14</td><td>CLI</td><td>51.66.0</td><td>This release adds the created at date for Users, Services, and Tokens to the CLI output, and exposes the data as read-only in the SDKs.</td></tr><tr><td>2025-11-14</td><td>Control Plane</td><td>117.29.0</td><td>This release adds the created at date for Users, Services, and Tokens to the CLI output, and exposes the data as read-only in the SDKs.</td></tr><tr><td>2025-11-14</td><td>Terraform Provider</td><td>15.31.0</td><td>This release adds the created at date for Users, Services, and Tokens to the CLI output, and exposes the data as read-only in the SDKs.</td></tr><tr><td>2025-11-14</td><td>Ruby SDK</td><td>15.31.0</td><td>This release adds the created at date for Users, Services, and Tokens to the CLI output, and exposes the data as read-only in the SDKs.</td></tr><tr><td>2025-11-14</td><td>Java SDK</td><td>15.31.0</td><td>This release adds the created at date for Users, Services, and Tokens to the CLI output, and exposes the data as read-only in the SDKs.</td></tr><tr><td>2025-11-14</td><td>Python SDK</td><td>15.31.0</td><td>This release adds the created at date for Users, Services, and Tokens to the CLI output, and exposes the data as read-only in the SDKs.</td></tr><tr><td>2025-11-14</td><td>Go SDK</td><td>15.31.0</td><td>This release adds the created at date for Users, Services, and Tokens to the CLI output, and exposes the data as read-only in the SDKs.</td></tr><tr><td>2025-11-13</td><td>CLI</td><td>51.65.0</td><td>This release adds new VNM-related CLI commands: <code>sdm system vnm install</code> (to install the VNM service, <code>sdm system vnm uninstall</code> (to uninstall the VNM service), <code>sdm system vnm status</code> (to check VNM service status), <code>sdm system vnm files</code> (to extract the VNM files from CLI binary), and <code>sdm system desktop uninstall</code> (general desktop uninstall command.</td></tr><tr><td>2025-11-13</td><td>Control Plane</td><td>117.19.0</td><td>This release updates device trust status for active sessions more quickly and reliably when settings related to device trust are changed.</td></tr><tr><td>2025-11-13</td><td>Control Plane</td><td>117.16.0</td><td>This release retries Resource Discovery Scans that fail to dispatch 3 times before eventually erroring over approximately 40 minutes.</td></tr><tr><td>2025-11-12</td><td>Control Plane</td><td>117.8.0</td><td>This release adds unstable MySQL secret engine support. MySQL secret engine is used to manage MySQL account credentials.</td></tr><tr><td>2025-11-12</td><td>CLI</td><td>51.63.0</td><td>This release adds unstable MySQL secret engine support. MySQL secret engine is used to manage MySQL account credentials.</td></tr><tr><td>2025-11-12</td><td>Control Plane</td><td>117.4.0</td><td>This release adds a support for EC2 and IAM authentication methods in HashiCorp Vault for RDP and SSH certificate authorities.</td></tr><tr><td>2025-11-12</td><td>CLI</td><td>51.62.0</td><td>This release adds a support for EC2 and IAM authentication methods in HashiCorp Vault for RDP and SSH certificate authorities.</td></tr><tr><td>2025-11-12</td><td>Terraform Provider</td><td>15.28.0</td><td>This release adds a support for EC2 and IAM authentication methods in HashiCorp Vault for RDP and SSH certificate authorities.</td></tr><tr><td>2025-11-12</td><td>Java SDK</td><td>15.29.0</td><td>This release adds a support for EC2 and IAM authentication methods in HashiCorp Vault for RDP and SSH certificate authorities.</td></tr><tr><td>2025-11-12</td><td>Ruby SDK</td><td>15.29.0</td><td>This release adds a support for EC2 and IAM authentication methods in HashiCorp Vault for RDP and SSH certificate authorities.</td></tr><tr><td>2025-11-12</td><td>Python SDK</td><td>15.29.0</td><td>This release adds a support for EC2 and IAM authentication methods in HashiCorp Vault for RDP and SSH certificate authorities.</td></tr><tr><td>2025-11-12</td><td>Go SDK</td><td>15.29.0</td><td>This release adds a support for EC2 and IAM authentication methods in HashiCorp Vault for RDP and SSH certificate authorities.</td></tr><tr><td>2025-11-07</td><td>Desktop Application</td><td>23.41.0</td><td>This release updates the desktop app to show a notification when a resource connection fails.</td></tr><tr><td>2025-11-07</td><td>CLI</td><td>51.56.0</td><td>This release updates the desktop app to show a notification when a resource connection fails.</td></tr><tr><td>2025-11-07</td><td>Desktop Application</td><td>23.40.0</td><td>This release fixes a regression that broke admin installations for a target user using the <code>--SDMUSER</code> flag.</td></tr><tr><td>2025-11-07</td><td>CLI</td><td>51.55.0</td><td>This release fixes a regression that broke admin installations for a target user using the <code>--SDMUSER</code> flag.</td></tr><tr><td>2025-11-07</td><td>CLI</td><td>51.54.0</td><td>This release fixes an issue that caused certain log messages to be erroneously omitted from the diagnostics.</td></tr><tr><td>2025-11-07</td><td>Control Plane</td><td>116.91.0</td><td>This release adds a support for user lookup for Okta MFA by ExternalID.</td></tr><tr><td>2025-11-06</td><td>Control Plane</td><td>116.88.0</td><td>This release fixes a race condition where multiple concurrent SCIM requests that all introduce the same new Identity Set would result in multiple creation attempts for that set.</td></tr><tr><td>2025-11-05</td><td>Control Plane</td><td>116.80.0</td><td>Fixed bug preventing users from setting a start date on access requests</td></tr><tr><td>2025-11-04</td><td>Control Plane</td><td>116.75.0</td><td>This release updates the Admin UI's Lock Status column of lockable resources to show the full user's name.</td></tr><tr><td>2025-11-04</td><td>Control Plane</td><td>116.72.0</td><td>This release fixes an issue where the link in the hover text on an account in the policy editor does not link to the correct page.</td></tr><tr><td>2025-11-04</td><td>Control Plane</td><td>116.71.0</td><td>This release updates the SCIM provisioning details on the User Management Settings page to show"Token created" instead of "Created" for the label of the token's created date.</td></tr><tr><td>2025-11-03</td><td>Control Plane</td><td>116.65.0</td><td>This release updates the token expiry column to have a tool tip with the exact time of the expiration.</td></tr><tr><td>2025-11-03</td><td>Control Plane</td><td>116.64.0</td><td>This release fixes a validation bug where the last node associated with a connector could not be removed via the Admin UI. In addition, it updates some SCIM error messages to contain more useful information when modifying Identity Aliases.</td></tr><tr><td>2025-11-01</td><td>CLI</td><td>51.47.0</td><td>This release updates discovery scanning in AWS, so it falls back to scanning only the current region if listing all regions fails.</td></tr><tr><td>2025-10-31</td><td>Control Plane</td><td>116.60.0</td><td>This release updates access requests so that users can no longer request access to a resource with an empty reason.</td></tr><tr><td>2025-10-31</td><td>Control Plane</td><td>116.59.0</td><td>This release fixes an issue where secret engine health checks were showing up for the wrong secret engine.</td></tr><tr><td>2025-10-31</td><td>Control Plane</td><td>116.57.0</td><td>This release adds a resource type filter to the managed resources page of the Admin UI that groups the resource by the legacy category.</td></tr><tr><td>2025-10-30</td><td>CLI</td><td>51.46.0</td><td>This release ensures that the desktop app version displays in <code>sdm doctor</code>.</td></tr><tr><td>2025-10-29</td><td>CLI</td><td>51.45.0</td><td>This release updates the version of Go used to build the product to version 1.25.3. This version of Go fixes a regression in TLS certificate verification introduced in Go 1.25.2 that resulted in TLS certificates containing SAN extension DNS names with trailing periods to fail to parse. This could result in failures to connect to resources that presented server TLS certificates with such DNS names, such as those generated in some Kubernetes environments.</td></tr><tr><td>2025-10-29</td><td>Control Plane</td><td>116.55.0</td><td>This release updates the version of Go used to build the product to version 1.25.3. This version of Go fixes a regression in TLS certificate verification introduced in Go 1.25.2 that resulted in TLS certificates containing SAN extension DNS names with trailing periods to fail to parse. This could result in failures to connect to resources that presented server TLS certificates with such DNS names, such as those generated in some Kubernetes environments.</td></tr><tr><td>2025-10-24</td><td>Control Plane</td><td>116.51.0</td><td>This release adds activity type icons for connectors.</td></tr><tr><td>2025-10-24</td><td>Control Plane</td><td>116.49.0</td><td>This release adds support for storage and retrieval of the username property in the Active Directory secret engine's secrets, and adds support for Identity Set identity mapping for password-based authentication in RDP servers. Identity Aliases should be a name of the secret storing the credentials for the given user and the <code>$SDM_USERNAME</code> variable should be used in the resource's username and password paths.</td></tr><tr><td>2025-10-24</td><td>CLI</td><td>51.42.0</td><td>This release adds support for storage and retrieval of the username property in the Active Directory secret engine's secrets, and adds support for Identity Set identity mapping for password-based authentication in RDP servers. Identity Aliases should be a name of the secret storing the credentials for the given user and the <code>$SDM_USERNAME</code> variable should be used in the resource's username and password paths.</td></tr><tr><td>2025-10-23</td><td>Control Plane</td><td>116.48.0</td><td>This release adds a small empty state component to porcelain. It uses the empty state component in the managed resources page and refactors the asset and connector table empty states to use this new component. Additionally the <code>totalResourceCount</code> query is moved a level higher so the new empty state can be rendered without any table components.</td></tr><tr><td>2025-10-23</td><td>Control Plane</td><td>116.46.0</td><td>This release fixes a scenario where Slack can appear to hang when making a request that fails. Now an informative message will be displayed to the user.</td></tr><tr><td>2025-10-23</td><td>Control Plane</td><td>116.45.0</td><td>This release updates activity log icons to have tooltips.</td></tr><tr><td>2025-10-23</td><td>Control Plane</td><td>116.44.0</td><td>This release fixes the vertical alignment on the proxy clusters table for the diagnostics button.</td></tr><tr><td>2025-10-23</td><td>CLI</td><td>51.40.0</td><td>This release adds ElastiCache IAM authentication.</td></tr><tr><td>2025-10-23</td><td>Terraform Provider</td><td>15.27.0</td><td>This release adds ElastiCache IAM authentication.</td></tr><tr><td>2025-10-23</td><td>Go SDK</td><td>15.27.0</td><td>This release adds ElastiCache IAM authentication.</td></tr><tr><td>2025-10-23</td><td>Ruby SDK</td><td>15.27.0</td><td>This release adds ElastiCache IAM authentication.</td></tr><tr><td>2025-10-22</td><td>Control Plane</td><td>116.41.0</td><td>This release updates the icon associated with health status to use checkbox and X icons.</td></tr><tr><td>2025-10-22</td><td>Control Plane</td><td>116.40.0</td><td>This release fixes a rare scenario that would cause ServiceNow access request-related functionality to break, or for data to fall out of sync from StrongDM.</td></tr><tr><td>2025-10-22</td><td>Control Plane</td><td>116.36.0</td><td>This release updates the <code>sdm__connector_id</code> tag on any nodes associated with Discovery Connectors to contain their respective connector IDs.</td></tr><tr><td>2025-10-21</td><td>Control Plane</td><td>116.31.0</td><td>This release adds "No results found" to various comboboxes with static menus.</td></tr><tr><td>2025-10-21</td><td>Control Plane</td><td>116.27.0</td><td>This release updates tables with no content to no longer have a dividing bar between the head and body of the table.</td></tr><tr><td>2025-10-20</td><td>Control Plane</td><td>116.21.0</td><td>This release updates connectors, so that when modifying the Node IDs field of a discovery connector, the nodes you provide will now be tagged with the relevant <code>sdm__connector_id</code> tag. This tag is used by connectors to select nodes to run scans.</td></tr><tr><td>2025-10-20</td><td>Control Plane</td><td>116.14.0</td><td>This release addresses an issue where the client session ID metadata associated with recent queries against resource types supporting this metadata (PostgreSQL, Oracle, SQL Server) was not displayed in the Logs > Queries page of the admin UI. This was caused by this metadata being omitted from a cache of new queries, and so was only displayed in the admin UI for older queries not served from that cache.</td></tr><tr><td>2025-10-20</td><td>Control Plane</td><td>116.12.0</td><td>This release wraps credential controls in error boundary.</td></tr><tr><td>2025-10-20</td><td>Control Plane</td><td>116.10.0</td><td>This release adds new optional fields (roleArn and roleExternalID) for the AWS Secrets Manager secret store, which enable a gateway to assume an IAM role when accessing AWS Secrets Manager.</td></tr><tr><td>2025-10-20</td><td>Terraform Provider</td><td>15.25.0</td><td>This release adds new optional fields (roleArn and roleExternalID) for the AWS Secrets Manager secret store, which enable a gateway to assume an IAM role when accessing AWS Secrets Manager.</td></tr><tr><td>2025-10-20</td><td>Java SDK</td><td>15.25.0</td><td>This release adds new optional fields (roleArn and roleExternalID) for the AWS Secrets Manager secret store, which enable a gateway to assume an IAM role when accessing AWS Secrets Manager.</td></tr><tr><td>2025-10-20</td><td>Python SDK</td><td>15.25.0</td><td>This release adds new optional fields (roleArn and roleExternalID) for the AWS Secrets Manager secret store, which enable a gateway to assume an IAM role when accessing AWS Secrets Manager.</td></tr><tr><td>2025-10-20</td><td>Go SDK</td><td>15.25.0</td><td>This release adds new optional fields (roleArn and roleExternalID) for the AWS Secrets Manager secret store, which enable a gateway to assume an IAM role when accessing AWS Secrets Manager.</td></tr><tr><td>2025-10-20</td><td>Ruby SDK</td><td>15.25.0</td><td>This release adds new optional fields (roleArn and roleExternalID) for the AWS Secrets Manager secret store, which enable a gateway to assume an IAM role when accessing AWS Secrets Manager.</td></tr><tr><td>2025-10-17</td><td>Control Plane</td><td>116.9.0</td><td>This release improves the performance of deleting resources and accounts that have many open sessions to resources. This situation can occur in particular when frequently using service accounts to access StrongDM resources in short-lived containers.</td></tr><tr><td>2025-10-17</td><td>Control Plane</td><td>116.6.0</td><td>This release presents a new "no search results" message on secret engine and secret tabs.</td></tr><tr><td>2025-10-17</td><td>Control Plane</td><td>116.5.0</td><td>This release adds the resource type (asset kind) selector to discovery connector forms for configuration. Additionally, it changes the name of Asset.family in GraphQL to Asset.kind to be consistent.</td></tr><tr><td>2025-10-16</td><td>CLI</td><td>51.34.0</td><td>This release corrects an issue when using the SQLPlus Oracle Client where sending a username with a shorter length than the actual username on the server would cause error: ORA-03146: invalid buffer length for TTC field.</td></tr><tr><td>2025-10-16</td><td>Control Plane</td><td>115.97.0</td><td>This release adds mapped identities (such as Kubernetes privileges) to the account, resource, and role entitlements CSV downloads. These identities are encoded as a comma-separated list with double quotes surrounding the elements if more than one mapped identity is included.</td></tr><tr><td>2025-10-15</td><td>Control Plane</td><td>115.92.0</td><td>This release adjusts connector details page break points to accommodate a wider table.</td></tr><tr><td>2025-10-15</td><td>Desktop Application</td><td>23.24.0</td><td>This release fixes an issue so that using both <code>@logout</code> and <code>@notify</code> policy annotations no longer cause the desktop app notification popup to hang for 10 seconds.</td></tr><tr><td>2025-10-15</td><td>Control Plane</td><td>115.88.0</td><td>This release updates networking tables to use the new "no search results" messaging.</td></tr><tr><td>2025-10-14</td><td>Desktop Application</td><td>23.23.0</td><td>This release updates the desktop app copyright.</td></tr><tr><td>2025-10-13</td><td>Control Plane</td><td>115.81.0</td><td>This release updates tables in the Admin UI to show a new "no results" message when search results return nothing.</td></tr><tr><td>2025-10-13</td><td>CLI</td><td>51.26.0</td><td>This release adds the MySQL (mTLS) resource type.</td></tr><tr><td>2025-10-13</td><td>Terraform Provider</td><td>15.22.0</td><td>This release adds the MySQL (mTLS) resource type.</td></tr><tr><td>2025-10-13</td><td>Python SDK</td><td>15.22.0</td><td>This release adds the MySQL (mTLS) resource type.</td></tr><tr><td>2025-10-13</td><td>Java SDK</td><td>15.22.0</td><td>This release adds the MySQL (mTLS) resource type.</td></tr><tr><td>2025-10-13</td><td>Go SDK</td><td>15.22.0</td><td>This release adds the MySQL (mTLS) resource type.</td></tr><tr><td>2025-10-13</td><td>Ruby SDK</td><td>15.22.0</td><td>This release adds the MySQL (mTLS) resource type.</td></tr><tr><td>2025-10-10</td><td>CLI</td><td>51.25.0</td><td>This release fixes a behavior in the Oracle driver where users would see two connection attempts (first one timing out) when initially using an Oracle resource. Connections to an oracle resource should now only yield one connection attempt (excluding redirects).</td></tr><tr><td>2025-10-10</td><td>CLI</td><td>51.23.0</td><td>This release removes obsolete support for Oracle Database versions 8i and 11g (clients and servers) from Oracle resources, which have not been officially supported for several years.</td></tr><tr><td>2025-10-10</td><td>Control Plane</td><td>115.73.0</td><td>This release updates Admin UI table loaders to be centered to distinguish them from normal rows.</td></tr><tr><td>2025-10-10</td><td>Control Plane</td><td>115.72.0</td><td>This release rearranges tabs on the Admin UI Roles details page tabs to be ordered <code>Access Rules, Entitlements, Groups, Members, Settings</code>.</td></tr><tr><td>2025-10-10</td><td>Control Plane</td><td>115.71.0</td><td>This release fixes an issue where API, admin, or SCIM tokens with permissions to update role names but not modify access rules failed to update role names due to a permissions error.</td></tr><tr><td>2025-10-09</td><td>CLI</td><td>51.20.0</td><td>This release fixes an issue with Oracle resources where connections from JDBC-based Oracle clients (such as DBeaver and SQL Developer) could fail with a decoding error during authentication. This issue only occurred with certain non-default Oracle client and server configurations, such as having client query result caching enabled.</td></tr><tr><td>2025-10-09</td><td>Control Plane</td><td>115.69.0</td><td>This release changes the state of scheduling scans when scans are scheduled using the scan requested field.</td></tr><tr><td>2025-10-09</td><td>Control Plane</td><td>115.68.0</td><td>This release updates query logs to correctly show the client's sessionID instead of the internal sessionID.</td></tr><tr><td>2025-10-09</td><td>Desktop Application</td><td>22.59.15</td><td>This release fixes an issue so that when the sdm network becomes degraded for short periods but recovers, the alert banner is not shown, but if the network becomes degraded for longer than 15 seconds, the banner is shown.</td></tr><tr><td>2025-10-08</td><td>CLI</td><td>51.17.0</td><td>This release reverts changes to Oracle health checks in the StrongDM CLI to perform a full authentication and validation of the username and password as part of the health check. These changes introduced an issue causing health checks to fail in some Oracle environments, and so have been temporarily reverted to the original implementation, which only validated connectivity to the Oracle database server.</td></tr><tr><td>2025-10-08</td><td>Control Plane</td><td>115.59.0</td><td>This release updates various comboboxes throughout the Admin UI to have menu items when there are no results found.</td></tr><tr><td>2025-10-08</td><td>Control Plane</td><td>115.58.0</td><td>This release updates the Admin UI to display the groups information banner if the user is currently provisioned by roles, not groups, from the identity provider. If a user reaches out to StrongDM and switches provisioning from roles to groups, then the banner will no longer be displayed.</td></tr><tr><td>2025-10-07</td><td>CLI</td><td>51.15.0</td><td>This release fixes an issue where both Azure Connectors and Entra ID resources were running the same scan. This release splits Azure Connector scans and Entra ID scans so they only scan relevant resources.</td></tr><tr><td>2025-10-07</td><td>Control Plane</td><td>115.56.0</td><td>This release fixes an issue where both Azure Connectors and Entra ID resources were running the same scan. This release splits Azure Connector scans and Entra ID scans so they only scan relevant resources.</td></tr><tr><td>2025-10-07</td><td>Control Plane</td><td>115.55.0</td><td>This release updates Admin UI search bars above tables to no longer have a button for triggering the search. The "x" icon for clearing the filters is only visible if there are custom filters active.</td></tr><tr><td>2025-10-07</td><td>Control Plane</td><td>115.54.0</td><td>This release adds a copy connector tag button to the connector forms and the connector table. This tag is used by admins to dynamically attach nodes to a connector for discovery.</td></tr><tr><td>2025-10-06</td><td>Desktop Application</td><td>23.15.0</td><td>This release adds support to the desktop app for HTTP proxies via the <code>HTTP_PROXY</code> and <code>HTTPS_PROXY</code> headers and excludes paths via <code>NO_PROXY</code>.</td></tr><tr><td>2025-10-03</td><td>Control Plane</td><td>115.44.0</td><td>This release improves and adds to connector forms and settings.</td></tr><tr><td>2025-10-03</td><td>Control Plane</td><td>115.38.0</td><td>This release fixes an issue where the header for the Admin UI Update Certificate Authority modal was appearing on the bottom instead of the top of the modal, and an issue where the radio panel for Certificate Authorities would not remain updated properly after confirming the switch to a new Certificate Authority.</td></tr><tr><td>2025-10-02</td><td>CLI</td><td>51.9.0</td><td>This release exposes the groups subtree under <code>sdm admin</code> for the new Groups feature which is now generally available.</td></tr><tr><td>2025-10-02</td><td>Control Plane</td><td>115.33.0</td><td>This release fixes an issue where the Admin UI Integrations page would shift at certain window sizes.</td></tr><tr><td>2025-10-02</td><td>Control Plane</td><td>115.29.0</td><td>This release makes StrongDM user groups generally available. Groups in StrongDM provide a way to organize users and manage permissions at scale. Instead of assigning users to roles individually, you can create groups, assign users to those groups, and then assign roles to the entire group. This makes access management more efficient and easier to maintain.</td></tr><tr><td>2025-10-01</td><td>Control Plane</td><td>115.24.0</td><td>This release updates query logs to contain session IDs on applicable resources.</td></tr><tr><td>2025-09-30</td><td>CLI</td><td>51.3.0</td><td>This release adds more debug logs to Couchbase resources on nodes.</td></tr><tr><td>2025-09-28</td><td>Control Plane</td><td>114.99.0</td><td>Scans that find no entities now get properly marked as completed.</td></tr><tr><td>2025-09-26</td><td>CLI</td><td>50.99.0</td><td>This release improves the health check for Oracle resources by validating authentication and query execution complete successfully using the configured credentials. Previously, health checks for Oracle resources only performed a basic connectivity check and would not detect some misconfigurations such as an incorrect username or password.</td></tr><tr><td>2025-09-26</td><td>CLI</td><td>50.97.0</td><td>This release adds support for connecting to Oracle databases on version 23ai from supported JDBC and SQL*Plus clients.</td></tr><tr><td>2025-09-25</td><td>CLI</td><td>50.92.0</td><td>GCP discovery scans will now attempt to scan the current project-ID if the list of all projects can not be obtained (e.g. if permission is not available)</td></tr><tr><td>2025-09-25</td><td>Control Plane</td><td>114.80.0</td><td>None</td></tr><tr><td>2025-09-25</td><td>CLI</td><td>50.90.0</td><td>This release adds support for PLAIN mode of DSEAuthenticator in Cassandra (DSE).</td></tr><tr><td>2025-09-24</td><td>Control Plane</td><td>114.73.0</td><td>This release resolves an issue where installations that use the MSI installer could not autoupdate</td></tr><tr><td>2025-09-24</td><td>Desktop Application</td><td>23.11.0</td><td>This release updates the desktop app to no longer make ping calls to determine if the network is online</td></tr><tr><td>2025-09-24</td><td>CLI</td><td>50.86.0</td><td>The <code>sdm admin network vnm</code> sub-commands now return more useful information when an error occurs.</td></tr><tr><td>2025-09-23</td><td>CLI</td><td>50.83.0</td><td>This release improves detection and logging of authentication errors when connecting to Oracle resources, to assist in the diagnosis of resource configuration errors such as an incorrectly-configured username, password, or service name.</td></tr><tr><td>2025-09-23</td><td>Desktop Application</td><td>23.9.0</td><td>This release updates the desktop app to show network offline view when the network is unreachable</td></tr><tr><td>2025-09-23</td><td>Control Plane</td><td>114.61.0</td><td>This release fixes a bug where Roles would not sync to Okta as Groups</td></tr><tr><td>2025-09-23</td><td>CLI</td><td>50.81.0</td><td>This release adds support for connecting to Oracle databases on version 23ai from the Toad client using its native driver.</td></tr><tr><td>2025-09-22</td><td>Control Plane</td><td>114.55.0</td><td>This release exposes Group related permissions for use when creating an API Key or Admin Token</td></tr><tr><td>2025-09-22</td><td>Java SDK</td><td>15.16.0</td><td>This release exposes Group related permissions for use when creating an API Key or Admin Token</td></tr><tr><td>2025-09-22</td><td>Terraform Provider</td><td>15.16.0</td><td>This release exposes Group related permissions for use when creating an API Key or Admin Token</td></tr><tr><td>2025-09-22</td><td>Go SDK</td><td>15.16.0</td><td>This release exposes Group related permissions for use when creating an API Key or Admin Token</td></tr><tr><td>2025-09-22</td><td>Ruby SDK</td><td>15.16.0</td><td>This release exposes Group related permissions for use when creating an API Key or Admin Token</td></tr><tr><td>2025-09-22</td><td>Python SDK</td><td>15.16.0</td><td>This release exposes Group related permissions for use when creating an API Key or Admin Token</td></tr><tr><td>2025-09-19</td><td>Control Plane</td><td>114.51.0</td><td><ul><li>Proxy cluster health status is now available at a glance on the list page.</li></ul></td></tr><tr><td>2025-09-19</td><td>Control Plane</td><td>114.49.0</td><td>This release adds support for Groups to the SDKs and Terraform provider.</td></tr><tr><td>2025-09-19</td><td>Java SDK</td><td>15.15.0</td><td>This release adds support for Groups to the SDKs and Terraform provider.</td></tr><tr><td>2025-09-19</td><td>Terraform Provider</td><td>15.15.0</td><td>This release adds support for Groups to the SDKs and Terraform provider.</td></tr><tr><td>2025-09-19</td><td>Python SDK</td><td>15.15.0</td><td>This release adds support for Groups to the SDKs and Terraform provider.</td></tr><tr><td>2025-09-19</td><td>Go SDK</td><td>15.15.0</td><td>This release adds support for Groups to the SDKs and Terraform provider.</td></tr><tr><td>2025-09-19</td><td>Ruby SDK</td><td>15.15.0</td><td>This release adds support for Groups to the SDKs and Terraform provider.</td></tr><tr><td>2025-09-19</td><td>Desktop Application</td><td>21.96.3</td><td>This release fixes SSO logins for this version of desktop</td></tr><tr><td>2025-09-19</td><td>CLI</td><td>50.78.0</td><td>This release resolves an issue in older desktop versions (21.96.2 and earlier) where authenticating with Azure SSO would fail</td></tr><tr><td>2025-09-19</td><td>Control Plane</td><td>114.46.0</td><td>This release makes Google Cloud Storage and Azure Blob Storage available to all users eligible to configure as Log Stream destinations.</td></tr><tr><td>2025-09-18</td><td>Desktop Application</td><td>22.59.14</td><td>This release resolves an issue where the desktop application fails to load when installing for everyone via the MSI installer.</td></tr><tr><td>2025-09-18</td><td>Control Plane</td><td>114.41.0</td><td>This release adds the <code>type</code> column to the scans table and adds a drawer to provide additional context on click of a scan table row. For large screens the drawer opens from the right and on small screens, a vertical drawer.</td></tr><tr><td>2025-09-18</td><td>Control Plane</td><td>114.40.0</td><td>This release adds a search bar to account details role tab for searching assigned roles.</td></tr><tr><td>2025-09-18</td><td>Control Plane</td><td>114.39.0</td><td>This release fixes an issue with the Microsoft Teams integration where requesting access to a Microsoft Entra ID resource with privilege levels did not display the privileges input field. It also fixes an issue with the Jira integration where requesting access to a resource with privilege levels did not display the privileges input field.</td></tr><tr><td>2025-09-18</td><td>Desktop Application</td><td>23.7.0</td><td>This release resolves an issue where the desktop application fails to load when installing for everyone via the MSI installer</td></tr><tr><td>2025-09-18</td><td>Control Plane</td><td>114.34.0</td><td>This release fixes an issue with some discovered resources being unmanageable due to missing a public endpoint. When discovering a resource without a public endpoint we will now attempt to fall back to any configured private endpoints.</td></tr><tr><td>2025-09-18</td><td>CLI</td><td>50.75.0</td><td>This release fixes an issue with some discovered resources being unmanageable due to missing a public endpoint. When discovering a resource without a public endpoint we will now attempt to fall back to any configured private endpoints.</td></tr><tr><td>2025-09-17</td><td>Control Plane</td><td>114.31.0</td><td>This release fixes an issue that can cause a connector to become undiscoverable when multiple scans complete at the same time. If you are having this issue, creating a new connector with the same configuration will now allow scans to complete.</td></tr><tr><td>2025-09-17</td><td>CLI</td><td>50.73.0</td><td>This release adds support for enabling TLS for Oracle NNE resources to allow connectivity to Oracle database servers that require both TLS and NNE.</td></tr><tr><td>2025-09-17</td><td>Control Plane</td><td>114.28.0</td><td>This release adds support for enabling TLS for Oracle NNE resources to allow connectivity to Oracle database servers that require both TLS and NNE.</td></tr><tr><td>2025-09-17</td><td>Java SDK</td><td>15.14.0</td><td>This release adds support for enabling TLS for Oracle NNE resources to allow connectivity to Oracle database servers that require both TLS and NNE.</td></tr><tr><td>2025-09-17</td><td>Terraform Provider</td><td>15.14.0</td><td>This release adds support for enabling TLS for Oracle NNE resources to allow connectivity to Oracle database servers that require both TLS and NNE.</td></tr><tr><td>2025-09-17</td><td>Python SDK</td><td>15.14.0</td><td>This release adds support for enabling TLS for Oracle NNE resources to allow connectivity to Oracle database servers that require both TLS and NNE.</td></tr><tr><td>2025-09-17</td><td>Ruby SDK</td><td>15.14.0</td><td>This release adds support for enabling TLS for Oracle NNE resources to allow connectivity to Oracle database servers that require both TLS and NNE.</td></tr><tr><td>2025-09-17</td><td>Go SDK</td><td>15.14.0</td><td>This release adds support for enabling TLS for Oracle NNE resources to allow connectivity to Oracle database servers that require both TLS and NNE.</td></tr><tr><td>2025-09-17</td><td>Control Plane</td><td>114.23.0</td><td>You are now able to assign multiple roles to an account on the account details role tab.</td></tr><tr><td>2025-09-16</td><td>CLI</td><td>50.71.0</td><td>Fixes an issue with TLS support in Oracle resources. Previously, configuring an Oracle resource to require TLS would result in a failure to connect to the resource due to an error in handling the Oracle TLS negotiation.</td></tr><tr><td>2025-09-16</td><td>CLI</td><td>50.70.0</td><td>Connections to proxy clusters now respect the <code>HTTP_PROXY</code> and <code>HTTPS_PROXY</code> environment variables.</td></tr><tr><td>2025-09-16</td><td>Control Plane</td><td>114.20.0</td><td>Fixes a bug where Microsoft Entra ID resources were being selected for discovery by the Kubernetes discovery system.</td></tr><tr><td>2025-09-15</td><td>CLI</td><td>50.67.0</td><td>Fixed a bug in the resource discovery scanner for GCP that could cause discovered resources to not get reported if one or more scans for other GCP resource-types fail.</td></tr><tr><td>2025-09-15</td><td>Desktop Application</td><td>22.59.12</td><td>Resolves issue where application would get stuck in a degraded state where a network connection error banner would be displayed and the resources appeared to be disabled and erroneous even though the service was online and working.</td></tr><tr><td>2025-09-15</td><td>CLI</td><td>50.66.0</td><td>RDP Certificate resources using the Keyfactor CA now support resolving the SID associated with identity aliases for full enforcement mode through LDAP, if configured in the resource.</td></tr><tr><td>2025-09-12</td><td>CLI</td><td>50.62.0</td><td>RDP Certificate resources using the AWS Private CA now support resolving the SID associated with identity aliases for full enforcement mode through LDAP, if configured in the resource.</td></tr><tr><td>2025-09-12</td><td>Desktop Application</td><td>23.4.0</td><td>Resolves issue where the application could get stuck in a degraded state where a network connection error banner would be displayed and the resources appeared to be disabled and erroneous even though the service was online and working.</td></tr><tr><td>2025-09-12</td><td>Control Plane</td><td>114.12.0</td><td>Improved account details role tab searching to match other tables</td></tr><tr><td>2025-09-12</td><td>Control Plane</td><td>114.9.0</td><td>Creating identity sets now honors the corresponding limits and can be adjusted by contacting support</td></tr><tr><td>2025-09-11</td><td>Desktop Application</td><td>22.59.11</td><td>This release packages the desktop app with version 50.15.0 of the CLI for cases where CLI upgrades are not working</td></tr><tr><td>2025-09-10</td><td>Desktop Application</td><td>22.59.10</td><td>This release updates the desktop app to always display common actions in desktop menu and improves auth state flow in situations such as when the network is unavailable or system goes to sleep</td></tr><tr><td>2025-09-10</td><td>CLI</td><td>50.58.0</td><td>Vault CA integrations now support just-in-time look up of user SIDs for certificate-based RDP resources. These resources can be configured to use an AD service account to query AD for the specified end user when operating in an AD environment that has full enforcement mode enabled (the default post Sept 2025).</td></tr><tr><td>2025-09-09</td><td>Control Plane</td><td>113.75.0</td><td>Fixes an error sometimes encountered when integrating with a small subset of OIDC providers such as SlashID where authorization could fail due to an issue in parsing the upstream OIDC configuration.</td></tr><tr><td>2025-09-08</td><td>CLI</td><td>50.53.0</td><td>When using an RDP (Certificate Auth) resource in an on-premises Active Directory environment with identity aliases, the SIDs required for certificate authentication with full enforcement enabled on the AD domain controllers can now be resolved by querying the DCs directly via LDAP. In this optional configuration, which requires an AD service account, its SID, and a list of domain controller addresses to be configured in the resource, SIDs do not need to be explicitly configured in the associated identity aliases. This configuration is currently only supported when using the Active Directory Certificate Services (ADCS) Certificate Authority with RDP resources. Refer to the RDP (Certificate Auth) documentation for additional information on this configuration.</td></tr><tr><td>2025-09-08</td><td>CLI</td><td>50.52.0</td><td>Added optional field to RDP certificate-based resources to specify a list of Domain controllers hostnames to allow for just-in-time SID look up for user when generating certificates.</td></tr><tr><td>2025-09-08</td><td>Terraform Provider</td><td>15.12.0</td><td>Added optional field to RDP certificate-based resources to specify a list of Domain controllers hostnames to allow for just-in-time SID look up for user when generating certificates.</td></tr><tr><td>2025-09-08</td><td>Control Plane</td><td>113.66.0</td><td>When using an RDP (Certificate Auth) resource in an on-premises Active Directory environment with identity aliases, the SIDs required for certificate authentication with full enforcement enabled on the AD domain controllers can now be resolved by querying the DCs directly via LDAP. In this optional configuration, which requires an AD service account, its SID, and a list of domain controller addresses to be configured in the resource, SIDs do not need to be explicitly configured in the associated identity aliases. This configuration is currently only supported when using the Active Directory Certificate Services (ADCS) Certificate Authority with RDP resources. Refer to the RDP (Certificate Auth) documentation for additional information on this configuration.</td></tr><tr><td>2025-09-08</td><td>Control Plane</td><td>113.63.0</td><td>Added optional field to RDP certificate-based resources to specify a list of Domain controllers hostnames to allow for just-in-time SID look up for user when generating certificates.</td></tr><tr><td>2025-09-08</td><td>Java SDK</td><td>15.12.0</td><td>Added optional field to RDP certificate-based resources to specify a list of Domain controllers hostnames to allow for just-in-time SID look up for user when generating certificates.</td></tr><tr><td>2025-09-08</td><td>Python SDK</td><td>15.12.0</td><td>Added optional field to RDP certificate-based resources to specify a list of Domain controllers hostnames to allow for just-in-time SID look up for user when generating certificates.</td></tr><tr><td>2025-09-08</td><td>Go SDK</td><td>15.12.0</td><td>Added optional field to RDP certificate-based resources to specify a list of Domain controllers hostnames to allow for just-in-time SID look up for user when generating certificates.</td></tr><tr><td>2025-09-08</td><td>Control Plane</td><td>113.61.0</td><td>Key value secrets now have a table view to copy just the value of key value pairs</td></tr><tr><td>2025-09-05</td><td>Control Plane</td><td>113.56.0</td><td>Bridged proxy clusters now report more complete health status, including connection status between bridge workers and proxy workers, and the <code>sdm install</code> command now checks for invalid combinations of flags and reports a helpful error message.</td></tr><tr><td>2025-09-05</td><td>CLI</td><td>50.51.0</td><td>Bridged proxy clusters now report more complete health status, including connection status between bridge workers and proxy workers, and the <code>sdm install</code> command now checks for invalid combinations of flags and reports a helpful error message.</td></tr><tr><td>2025-09-05</td><td>Control Plane</td><td>113.55.0</td><td>Diagnostic zip files now include more useful information in the filename.</td></tr><tr><td>2025-09-05</td><td>Desktop Application</td><td>23.0.0</td><td>This release resolves an issue where users were logged out after long periods of unattended use, as well as an issue for 64-bit Windows where the listener was not launching due to a missing binary.</td></tr><tr><td>2025-09-05</td><td>CLI</td><td>50.50.0</td><td>Adds support to the Oracle and Oracle (NNE) drivers for connecting to Oracle Real Application Clusters (RAC) through the cluster's Single Client Access Name (SCAN) DNS hostname.</td></tr><tr><td>2025-09-05</td><td>CLI</td><td>50.49.0</td><td>HashiCorp Vault is now a supported RDP Certificate-Based Authentication Provider when using RDP Full Enforcement Mode</td></tr><tr><td>2025-09-05</td><td>Control Plane</td><td>113.50.0</td><td>Prevent auditors from being able to attempt to change managers of users</td></tr><tr><td>2025-09-05</td><td>CLI</td><td>50.48.0</td><td>This release adds an option to choose whether to use the first ACS or the default ACS when connecting to Snowsight</td></tr><tr><td>2025-09-05</td><td>Control Plane</td><td>113.48.0</td><td>This release adds an option to choose whether to use the first ACS or the default ACS when connecting to Snowsight</td></tr><tr><td>2025-09-05</td><td>Terraform Provider</td><td>15.11.0</td><td>This release adds an option to choose whether to use the first ACS or the default ACS when connecting to Snowsight</td></tr><tr><td>2025-09-05</td><td>Java SDK</td><td>15.11.0</td><td>This release adds an option to choose whether to use the first ACS or the default ACS when connecting to Snowsight</td></tr><tr><td>2025-09-05</td><td>Python SDK</td><td>15.11.0</td><td>This release adds an option to choose whether to use the first ACS or the default ACS when connecting to Snowsight</td></tr><tr><td>2025-09-05</td><td>Ruby SDK</td><td>15.11.0</td><td>This release adds an option to choose whether to use the first ACS or the default ACS when connecting to Snowsight</td></tr><tr><td>2025-09-05</td><td>Go SDK</td><td>15.11.0</td><td>This release adds an option to choose whether to use the first ACS or the default ACS when connecting to Snowsight</td></tr><tr><td>2025-09-04</td><td>Control Plane</td><td>113.43.0</td><td>This release enables resource discovery in cloud providers for enterprise-tier customers.</td></tr><tr><td>2025-09-04</td><td>CLI</td><td>50.46.0</td><td>This release makes the Microsoft Entra ID resource type available to Enterprise customers.</td></tr><tr><td>2025-09-04</td><td>Control Plane</td><td>113.41.0</td><td>This release makes the Microsoft Entra ID resource type available to Enterprise customers.</td></tr><tr><td>2025-09-04</td><td>Terraform Provider</td><td>15.10.0</td><td>This release makes the Microsoft Entra ID resource type available to Enterprise customers.</td></tr><tr><td>2025-09-04</td><td>Java SDK</td><td>15.10.0</td><td>This release makes the Microsoft Entra ID resource type available to Enterprise customers.</td></tr><tr><td>2025-09-04</td><td>Python SDK</td><td>15.10.0</td><td>This release makes the Microsoft Entra ID resource type available to Enterprise customers.</td></tr><tr><td>2025-09-04</td><td>Ruby SDK</td><td>15.10.0</td><td>This release makes the Microsoft Entra ID resource type available to Enterprise customers.</td></tr><tr><td>2025-09-04</td><td>Go SDK</td><td>15.10.0</td><td>This release makes the Microsoft Entra ID resource type available to Enterprise customers.</td></tr><tr><td>2025-09-03</td><td>Control Plane</td><td>113.35.0</td><td>Ampersands (&#x26;) no longer appear as their unicode form (\u0026) when retrieving managed secrets</td></tr><tr><td>2025-09-03</td><td>Control Plane</td><td>113.34.0</td><td>Access request denials that come from the StrongDM system no longer displays as "a-0000000000000000"</td></tr><tr><td>2025-09-02</td><td>CLI</td><td>50.41.0</td><td>This release fixes a bug where setting users external id via the SDKs would be ignored. Filtering users by external id has been added.</td></tr><tr><td>2025-09-02</td><td>Control Plane</td><td>113.21.0</td><td>This release fixes a bug where setting a user's external id via the SDKs would be ignored. Filtering users by external id has been added.</td></tr><tr><td>2025-08-29</td><td>CLI</td><td>50.38.0</td><td>When creating, cloning, or updating resources via the CLI, you can now use <code>--bind-subdomain</code> as an alias for <code>subdomain</code> to specify a local DNS address.</td></tr><tr><td>2025-08-29</td><td>CLI</td><td>50.35.0</td><td>This release includes more debug information about Kubernetes healthcheck failures to the console.</td></tr><tr><td>2025-08-28</td><td>Control Plane</td><td>113.4.0</td><td>This release causes access rules with Kubernetes groups whose names are not valid Kubernetes group names to be rejected. This applies to access rules for access workflows, roles, and account grants.</td></tr><tr><td>2025-08-28</td><td>CLI</td><td>50.32.0</td><td>Disables a workaround in the StrongDM RDP driver for a Windows 11 24H2 RDP client bug causing rendering issues with RDP sessions through StrongDM. Microsoft released a fix for this issue in the Windows 11 24H2 build version 26100.3323 update on February 25, 2025, making the workaround obsolete. Disabling this unnecessary workaround improves RDP performance through StrongDM, particularly in high latency/low bandwidth client environments.</td></tr><tr><td>2025-08-28</td><td>Control Plane</td><td>112.96.0</td><td>This release disables a workaround in the StrongDM RDP driver for a Windows 11 24H2 RDP client bug causing rendering issues with RDP sessions through StrongDM. Microsoft released a fix for this issue in the Windows 11 24H2 build version 26100.3323 update on February 25, 2025, making the workaround obsolete. Disabling this unnecessary workaround improves RDP performance through StrongDM, particularly in high latency/low bandwidth client environments.</td></tr><tr><td>2025-08-28</td><td>CLI</td><td>50.31.0</td><td>This release fixes an issue in the Oracle (NNE) driver where the driver would panic and disconnect when connecting to an Oracle server with only one of encryption or data integrity (checksums) enabled in the Oracle server configuration, but not both. The driver now correctly handles all permutations of the encryption and data integrity server settings (both enabled, both disabled, or only one enabled).</td></tr><tr><td>2025-08-27</td><td>CLI</td><td>50.29.0</td><td>Enterprise customers will now be able to update their Virtual Network Mode setting via the CLI using the <code>sdm admin network vnm</code> command. The <code>sdm admin ports subnet</code> command has been removed.</td></tr><tr><td>2025-08-25</td><td>CLI</td><td>50.21.0</td><td>When using Virtual Networking Mode or IP Loopback ranges on macOS, the StrongDM System Service now logs information and errors in the running of the service to <code>/var/log/sdm.log</code> to assist in troubleshooting issues with this service.</td></tr><tr><td>2025-08-25</td><td>Control Plane</td><td>112.52.0</td><td>This release fixes an issue for customers participating in the Microsoft Entra ID resource beta, where Microsoft Entra ID resources could not be updated through the Admin UI.</td></tr><tr><td>2025-08-25</td><td>Desktop Application</td><td>22.59.9</td><td>Fixes an issue where locking using the CLI and starting the Desktop application would not show the expected unlock screen.</td></tr><tr><td>2025-08-22</td><td>Desktop Application</td><td>22.59.8</td><td>This release fixes an issue that caused occasional desktop app crashes. It also fixes auth verification to allow for slower network adapters to come online</td></tr><tr><td>2025-08-22</td><td>Desktop Application</td><td>22.94.0</td><td>Desktop will now retry validating credentials when the network is not available.</td></tr><tr><td>2025-08-22</td><td>Control Plane</td><td>112.31.0</td><td>This release improves the discovery experience, adding the ability to dispatch manual scans from connector details, adding the scan status column to scan table, and fixing a small bug in the connector update form.</td></tr><tr><td>2025-08-21</td><td>Desktop Application</td><td>22.59.7</td><td>This release fixes an issue where occasionally the desktop app got stuck loading when logging in via SSO.</td></tr><tr><td>2025-08-20</td><td>CLI</td><td>50.14.0</td><td>This release adds missing <code>proxyClusterId</code> and <code>secretStoreId</code> fields to the example resource JSON templates generated by the CLI.</td></tr><tr><td>2025-08-20</td><td>Control Plane</td><td>112.10.0</td><td>Tooltip on the setting for allowing non-sso users no longer includes inaccurate reference to user roles.</td></tr><tr><td>2025-08-20</td><td>CLI</td><td>50.12.0</td><td>This release adds support for Managed Identity authentication for MySQL.</td></tr><tr><td>2025-08-20</td><td>Control Plane</td><td>112.5.0</td><td>This release adds support for Managed Identity authentication for MySQL.</td></tr><tr><td>2025-08-20</td><td>Terraform Provider</td><td>15.8.0</td><td>This release adds support for Managed Identity authentication for MySQL.</td></tr><tr><td>2025-08-20</td><td>Java SDK</td><td>15.8.0</td><td>This release adds support for Managed Identity authentication for MySQL.</td></tr><tr><td>2025-08-20</td><td>Python SDK</td><td>15.8.0</td><td>This release adds support for Managed Identity authentication for MySQL.</td></tr><tr><td>2025-08-20</td><td>Go SDK</td><td>15.8.0</td><td>This release adds support for Managed Identity authentication for MySQL.</td></tr><tr><td>2025-08-20</td><td>Ruby SDK</td><td>15.8.0</td><td>This release adds support for Managed Identity authentication for MySQL.</td></tr><tr><td>2025-08-19</td><td>Control Plane</td><td>111.92.0</td><td>Principal option in the policy editor no longer prefills the search bar with a selection option</td></tr><tr><td>2025-08-18</td><td>Control Plane</td><td>111.85.0</td><td>Selection is cleared after bulk deleting approval workflows.</td></tr><tr><td>2025-08-18</td><td>CLI</td><td>50.10.0</td><td>The CLI command <code>sdm config</code> now displays the non-sensitive portion of the currently logged-in API access key for troubleshooting purposes.</td></tr><tr><td>2025-08-15</td><td>CLI</td><td>50.8.0</td><td>When Virtual Networking Mode is enabled, the resource creation form in the Admin UI now defaults the Connectivity Mode to VNM or Loopback based on the configured organization setting to use VNM for resource IP address allocation by default. Previously Loopback was always the default when creating new resources. When Virtual Networking Mode and/or Loopback IP Ranges are configured, the resource create and update forms both allow an IP address to be automatically assigned from the range configured for the selected connectivity mode by leaving the IP address field blank. Previously, this auto-allocation of an available IP address was supported when creating a resource with VNM but not when updating a resource from loopback to VNM. When updating a resource, the Port Overrides field may also be left blank (or set to -1 in the CLI) to automatically allocate a new available port override for the resource.</td></tr><tr><td>2025-08-15</td><td>Terraform Provider</td><td>15.7.0</td><td>When Virtual Networking Mode is enabled, the resource creation form in the Admin UI now defaults the Connectivity Mode to VNM or Loopback based on the configured organization setting to use VNM for resource IP address allocation by default. Previously Loopback was always the default when creating new resources. When Virtual Networking Mode and/or Loopback IP Ranges are configured, the resource create and update forms both allow an IP address to be automatically assigned from the range configured for the selected connectivity mode by leaving the IP address field blank. Previously, this auto-allocation of an available IP address was supported when creating a resource with VNM but not when updating a resource from loopback to VNM. When updating a resource, the Port Overrides field may also be left blank (or set to -1 in the CLI) to automatically allocate a new available port override for the resource.</td></tr><tr><td>2025-08-15</td><td>Control Plane</td><td>111.75.0</td><td>When Virtual Networking Mode is enabled, the resource creation form in the Admin UI now defaults the Connectivity Mode to VNM or Loopback based on the configured organization setting to use VNM for resource IP address allocation by default. Previously Loopback was always the default when creating new resources. When Virtual Networking Mode and/or Loopback IP Ranges are configured, the resource create and update forms both allow an IP address to be automatically assigned from the range configured for the selected connectivity mode by leaving the IP address field blank. Previously, this auto-allocation of an available IP address was supported when creating a resource with VNM but not when updating a resource from loopback to VNM. When updating a resource, the Port Overrides field may also be left blank (or set to -1 in the CLI) to automatically allocate a new available port override for the resource.</td></tr><tr><td>2025-08-15</td><td>Java SDK</td><td>15.7.0</td><td>When Virtual Networking Mode is enabled, the resource creation form in the Admin UI now defaults the Connectivity Mode to VNM or Loopback based on the configured organization setting to use VNM for resource IP address allocation by default. Previously Loopback was always the default when creating new resources. When Virtual Networking Mode and/or Loopback IP Ranges are configured, the resource create and update forms both allow an IP address to be automatically assigned from the range configured for the selected connectivity mode by leaving the IP address field blank. Previously, this auto-allocation of an available IP address was supported when creating a resource with VNM but not when updating a resource from loopback to VNM. When updating a resource, the Port Overrides field may also be left blank (or set to -1 in the CLI) to automatically allocate a new available port override for the resource.</td></tr><tr><td>2025-08-15</td><td>Python SDK</td><td>15.7.0</td><td>When Virtual Networking Mode is enabled, the resource creation form in the Admin UI now defaults the Connectivity Mode to VNM or Loopback based on the configured organization setting to use VNM for resource IP address allocation by default. Previously Loopback was always the default when creating new resources. When Virtual Networking Mode and/or Loopback IP Ranges are configured, the resource create and update forms both allow an IP address to be automatically assigned from the range configured for the selected connectivity mode by leaving the IP address field blank. Previously, this auto-allocation of an available IP address was supported when creating a resource with VNM but not when updating a resource from loopback to VNM. When updating a resource, the Port Overrides field may also be left blank (or set to -1 in the CLI) to automatically allocate a new available port override for the resource.</td></tr><tr><td>2025-08-15</td><td>Go SDK</td><td>15.7.0</td><td>When Virtual Networking Mode is enabled, the resource creation form in the Admin UI now defaults the Connectivity Mode to VNM or Loopback based on the configured organization setting to use VNM for resource IP address allocation by default. Previously Loopback was always the default when creating new resources. When Virtual Networking Mode and/or Loopback IP Ranges are configured, the resource create and update forms both allow an IP address to be automatically assigned from the range configured for the selected connectivity mode by leaving the IP address field blank. Previously, this auto-allocation of an available IP address was supported when creating a resource with VNM but not when updating a resource from loopback to VNM. When updating a resource, the Port Overrides field may also be left blank (or set to -1 in the CLI) to automatically allocate a new available port override for the resource.</td></tr><tr><td>2025-08-15</td><td>Ruby SDK</td><td>15.7.0</td><td>When Virtual Networking Mode is enabled, the resource creation form in the Admin UI now defaults the Connectivity Mode to VNM or Loopback based on the configured organization setting to use VNM for resource IP address allocation by default. Previously Loopback was always the default when creating new resources. When Virtual Networking Mode and/or Loopback IP Ranges are configured, the resource create and update forms both allow an IP address to be automatically assigned from the range configured for the selected connectivity mode by leaving the IP address field blank. Previously, this auto-allocation of an available IP address was supported when creating a resource with VNM but not when updating a resource from loopback to VNM. When updating a resource, the Port Overrides field may also be left blank (or set to -1 in the CLI) to automatically allocate a new available port override for the resource.</td></tr><tr><td>2025-08-14</td><td>Control Plane</td><td>111.64.0</td><td>This release adds a new <code>--default-to-vnm</code> parameter to the <code>sdm admin ports subnet</code> CLI used to configure Virtual Networking Mode (VNM) settings from the CLI. When VNM is enabled, this parameter allows a choice of whether new resources should default to being created with an available IP address in the VNM subnet or in the loopback subnet, when an explicit IP address is not specified. These settings are also exposed through the Network Settings in the Admin UI.</td></tr><tr><td>2025-08-14</td><td>CLI</td><td>50.6.0</td><td>This release adds a new <code>--default-to-vnm</code> parameter to the <code>sdm admin ports subnet</code> CLI used to configure Virtual Networking Mode (VNM) settings from the CLI. When VNM is enabled, this parameter allows a choice of whether new resources should default to being created with an available IP address in the VNM subnet or in the loopback subnet, when an explicit IP address is not specified. These settings are also exposed through the Network Settings in the Admin UI.</td></tr><tr><td>2025-08-14</td><td>Desktop Application</td><td>22.90.0</td><td><ul><li>[Fix] Prevents the desktop app from getting into a stuck loading state when authenticating with SSO</li></ul></td></tr><tr><td>2025-08-13</td><td>Control Plane</td><td>111.53.0</td><td>When adding secrets in the Admin UI the unique name validation now only checks uniqueness within the secret engine the secret is being added to.</td></tr><tr><td>2025-08-13</td><td>Control Plane</td><td>111.52.0</td><td>This release adds support to RDP (Certificate Based) resources for Identity Aliases containing Active Directory user SIDs for authenticating to RDP servers with Full Enforcement mode enabled (see the <a href="https://support.microsoft.com/en-us/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16">Microsoft Support Post</a>. Previously, Full Enforcement mode was required to be disabled on the domain controllers via the <code>StrongCertificateBindingEnforcement</code> registry setting, because StrongDM issued certificates did not contain the user SID required by this mode. Now, user SIDs may be explicitly specified in Identity Aliases by optionally including the SID in the alias, in either the format <code>USER@DOMAIN:SID</code>, <code>DOMAIN\USER:SID</code>, or <code>USER:SID</code>. This is currently only supported for the StrongDM RDP and ADCS certificate authorities.</td></tr><tr><td>2025-08-13</td><td>CLI</td><td>50.3.0</td><td>This release adds support to RDP (Certificate Based) resources for Identity Aliases containing Active Directory user SIDs for authenticating to RDP servers with Full Enforcement mode enabled (see the <a href="https://support.microsoft.com/en-us/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16">Microsoft Support Post</a>. Previously, Full Enforcement mode was required to be disabled on the domain controllers via the <code>StrongCertificateBindingEnforcement</code> registry setting, because StrongDM issued certificates did not contain the user SID required by this mode. Now, user SIDs may be explicitly specified in Identity Aliases by optionally including the SID in the alias, in either the format <code>USER@DOMAIN:SID</code>, <code>DOMAIN\USER:SID</code>, or <code>USER:SID</code>. This is currently only supported for the StrongDM RDP and ADCS certificate authorities.</td></tr><tr><td>2025-08-13</td><td>CLI</td><td>50.2.0</td><td>RDP resources using certificate authentication with leased credentials now support an optional SID (Security Identifier) field. This allows administrators to explicitly specify the Windows SID for user authentication, providing more precise control over RDP certificate-based access. The SID field is available in the Admin UI, CLI, and all SDKs when configuring RDP certificate resources with leased credentials. Specifying an SID is required to authenticate with an RDP server with Full Enforcement mode enabled (see the <a href="https://support.microsoft.com/en-us/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16">Microsoft Support Post</a></td></tr><tr><td>2025-08-13</td><td>Control Plane</td><td>111.47.0</td><td>RDP resources using certificate authentication with leased credentials now support an optional SID (Security Identifier) field. This allows administrators to explicitly specify the Windows SID for user authentication, providing more precise control over RDP certificate-based access. The SID field is available in the Admin UI, CLI, and all SDKs when configuring RDP certificate resources with leased credentials. Specifying an SID is required to authenticate with an RDP server with Full Enforcement mode enabled (see the <a href="https://support.microsoft.com/en-us/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16">Microsoft Support Post</a></td></tr><tr><td>2025-08-13</td><td>Terraform Provider</td><td>15.6.0</td><td>RDP resources using certificate authentication with leased credentials now support an optional SID (Security Identifier) field. This allows administrators to explicitly specify the Windows SID for user authentication, providing more precise control over RDP certificate-based access. The SID field is available in the Admin UI, CLI, and all SDKs when configuring RDP certificate resources with leased credentials. Specifying an SID is required to authenticate with an RDP server with Full Enforcement mode enabled (see the <a href="https://support.microsoft.com/en-us/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16">Microsoft Support Post</a></td></tr><tr><td>2025-08-13</td><td>Java SDK</td><td>15.6.0</td><td>RDP resources using certificate authentication with leased credentials now support an optional SID (Security Identifier) field. This allows administrators to explicitly specify the Windows SID for user authentication, providing more precise control over RDP certificate-based access. The SID field is available in the Admin UI, CLI, and all SDKs when configuring RDP certificate resources with leased credentials. Specifying an SID is required to authenticate with an RDP server with Full Enforcement mode enabled (see the <a href="https://support.microsoft.com/en-us/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16">Microsoft Support Post</a></td></tr><tr><td>2025-08-13</td><td>Go SDK</td><td>15.6.0</td><td>RDP resources using certificate authentication with leased credentials now support an optional SID (Security Identifier) field. This allows administrators to explicitly specify the Windows SID for user authentication, providing more precise control over RDP certificate-based access. The SID field is available in the Admin UI, CLI, and all SDKs when configuring RDP certificate resources with leased credentials. Specifying an SID is required to authenticate with an RDP server with Full Enforcement mode enabled (see the <a href="https://support.microsoft.com/en-us/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16">Microsoft Support Post</a></td></tr><tr><td>2025-08-13</td><td>Python SDK</td><td>15.6.0</td><td>RDP resources using certificate authentication with leased credentials now support an optional SID (Security Identifier) field. This allows administrators to explicitly specify the Windows SID for user authentication, providing more precise control over RDP certificate-based access. The SID field is available in the Admin UI, CLI, and all SDKs when configuring RDP certificate resources with leased credentials. Specifying an SID is required to authenticate with an RDP server with Full Enforcement mode enabled (see the <a href="https://support.microsoft.com/en-us/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16">Microsoft Support Post</a></td></tr><tr><td>2025-08-13</td><td>Ruby SDK</td><td>15.6.0</td><td>RDP resources using certificate authentication with leased credentials now support an optional SID (Security Identifier) field. This allows administrators to explicitly specify the Windows SID for user authentication, providing more precise control over RDP certificate-based access. The SID field is available in the Admin UI, CLI, and all SDKs when configuring RDP certificate resources with leased credentials. Specifying an SID is required to authenticate with an RDP server with Full Enforcement mode enabled (see the <a href="https://support.microsoft.com/en-us/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16">Microsoft Support Post</a></td></tr><tr><td>2025-08-12</td><td>Control Plane</td><td>111.40.0</td><td>Messages to approvers on our Slack integration now automatically update with the latest status when an access request is cancelled by the requester or times out.</td></tr><tr><td>2025-08-12</td><td>Control Plane</td><td>111.36.0</td><td>Users will now land on the catalog page after logging in if their org has workflows enabled</td></tr><tr><td>2025-08-12</td><td>Control Plane</td><td>111.33.0</td><td>This release addresses a bug that was sometimes causing an infinite loop of paginating on the discovered resources table.</td></tr><tr><td>2025-08-11</td><td>Control Plane</td><td>111.28.0</td><td>Improves the subdomain validation in the StrongDM Admin UI when creating resources with an HTTP or DNS subdomain. Previously, subdomains exceeding the maximum permitted length (63 characters) were incorrectly permitted, resulting in subdomains that were not resolvable on client systems.</td></tr><tr><td>2025-08-11</td><td>Control Plane</td><td>111.27.0</td><td>Improves the subdomain validation in the StrongDM Admin UI when creating resources with an HTTP or DNS subdomain. Previously, subdomains exceeding the maximum permitted length (63 characters) were incorrectly permitted, resulting in subdomains that were not resolvable on client systems. Existing resources that may have been created with a too-long name can continue to be updated, but new subdomains specified when creating or updating a resource are now validated and invalid subdomains will be rejected. Resource clones will now attempt to set the HTTP/DNS subdomain of a new resource to the original subdomain plus the suffix <code>-copy</code>, on a best effort, if a new subdomain for the cloned resource is not explicitly specified. If appending <code>-copy</code> would produce an invalid (too long) subdomain, clone now defaults to generating a random subdomain which may be changed after the cloned resource is created.</td></tr><tr><td>2025-08-11</td><td>Desktop Application</td><td>22.59.6</td><td><ul><li>[Fix] When a user denies an MFA request on unlock an error now is displayed in the desktop app</li></ul></td></tr><tr><td>2025-08-11</td><td>Desktop Application</td><td>22.88.0</td><td>This release addresses a bug where when denying an MFA request on unlock, the app would not show an alert, informing the user of the denial.</td></tr><tr><td>2025-08-11</td><td>Desktop Application</td><td>22.59.5</td><td>Polls to keep the authentication session alive while the desktop application is running</td></tr><tr><td>2025-08-11</td><td>Control Plane</td><td>111.22.0</td><td>This release updates privilege levels to be able to be applied to Kubernetes pod identities on dynamic access rules.</td></tr><tr><td>2025-08-08</td><td>Control Plane</td><td>111.15.0</td><td>This release improves the Slack app experience. Approve/Deny buttons no longer appear when the user is an approver and is unable to supply a decision for an approval step or has already submitted a decision.</td></tr><tr><td>2025-08-08</td><td>Control Plane</td><td>111.12.0</td><td>This release adds the update connector form to the Settings tab of connector details pages in the Admin UI and includes a small change to the connector forms.</td></tr><tr><td>2025-08-07</td><td>CLI</td><td>49.92.0</td><td>This release fixes an issue with RDP (Certificate Based) resources where in some Windows environments, the invocation of unimplemented SmartCard operations would cause an unexpected disconnection from the RDP server.</td></tr><tr><td>2025-08-07</td><td>Control Plane</td><td>111.3.0</td><td>This release adds an additional column to the scans table on connector details pages in the Admin UI.</td></tr><tr><td>2025-08-06</td><td>CLI</td><td>49.86.0</td><td>This release fixes an issue with RDP certificate based resources when invoking some ASCII-based smart card operations. In some Windows environments, the invocation of these previously unimplemented operations would cause an unexpected disconnection from the RDP server.</td></tr><tr><td>2025-08-06</td><td>Control Plane</td><td>110.95.0</td><td>This release fixes an issue involving updating a secret engine back to a previous value.</td></tr><tr><td>2025-08-05</td><td>CLI</td><td>49.85.0</td><td>This release fixes an issue with the Aerospike resource type where the <code>show sets</code> command would fail and close the connection against Aerospike versions 6.x and earlier.</td></tr><tr><td>2025-08-05</td><td>CLI</td><td>49.84.0</td><td>This release fixes an issue when using Virtual Networking Mode on macOS where the VNM DNS suffix (".sdm.network" in the StrongDM US control plane) was incorrectly added to the client DNS resolver's search domains.</td></tr><tr><td>2025-08-05</td><td>Control Plane</td><td>110.76.0</td><td>This release improves the readability of secret engine diagnostics.</td></tr><tr><td>2025-08-01</td><td>Control Plane</td><td>110.67.0</td><td>This release fixes an issue where attempting to connect to a resource that is not healthy would incorrectly mark that resource as healthy, until the next periodic background or forced healthcheck ran.</td></tr><tr><td>2025-08-01</td><td>Control Plane</td><td>110.55.0</td><td>This release adds a connectors detail page with a paginated scans table showing scan history.</td></tr><tr><td>2025-07-31</td><td>Control Plane</td><td>110.51.0</td><td>This release enables access request messages to our Slack integration to now automatically refresh when updates to access request status are made, instead of having to manually click "refresh" to receive updates.</td></tr><tr><td>2025-07-31</td><td>Control Plane</td><td>110.49.0</td><td>This release fixes an issue where request listing would fail in Microsoft Teams for access requests for deleted resources.</td></tr><tr><td>2025-07-31</td><td>Control Plane</td><td>110.48.0</td><td>This release updates bouncing email notifications to include a link to the StrongDM Help Center (https://help.strongdm.com/hc/en-us).</td></tr><tr><td>2025-07-31</td><td>Control Plane</td><td>110.47.0</td><td>This release makes Virtual Networking Mode (VNM) generally available to all organizations on the Enterprise plan. This feature allows clients to optionally connect to StrongDM resources through a virtual software-defined network instead of via loopback addresses.</td></tr><tr><td>2025-07-31</td><td>Desktop Application</td><td>22.59.4</td><td>This release allows for the installation of a symlink to the CLI when the VNM adapter is also installed.</td></tr><tr><td>2025-07-30</td><td>Desktop Application</td><td>22.84.0</td><td>This release modifies the Windows installer so that, when run by an Administrator, it installs a sdm.exe symlink in the target user's PATH.</td></tr><tr><td>2025-07-30</td><td>CLI</td><td>49.75.0</td><td>This release modifies the Windows installer so that, when run by an Administrator, it installs a sdm.exe symlink in the target user's PATH.</td></tr><tr><td>2025-07-30</td><td>Desktop Application</td><td>22.83.0</td><td>This release fixes an issue where the desktop app fails to start the listener due to a failure when loading stored credentials.</td></tr><tr><td>2025-07-30</td><td>Desktop Application</td><td>22.59.3</td><td>This release fixes an issue where the listener process attempts to spawn repeatedly if credentials fail to be verified due to network issues. Each launch of the listener kills the previous process causing unpredictable behavior.</td></tr><tr><td>2025-07-28</td><td>Control Plane</td><td>110.14.0</td><td>This release renames "Assets" to "Discovered Resources" across the Admin UI and moves the assets navigation.</td></tr><tr><td>2025-07-28</td><td>Control Plane</td><td>110.8.0</td><td>This release fixes an issue in the newly added email bounce limiters that would flag emails that had an automatic response set up (for example, out of office notifications) as bouncing.</td></tr><tr><td>2025-07-28</td><td>Control Plane</td><td>110.3.0</td><td>This release cleans up the Admin UI for filtering entitlements by removing the unused <strong>Policy</strong> reason.</td></tr><tr><td>2025-07-26</td><td>CLI</td><td>49.58.0</td><td>This update adds an approver reference to the <code>sdm audit</code> output for approval workflows.</td></tr><tr><td>2025-07-26</td><td>Control Plane</td><td>109.99.0</td><td>This update adds an approver reference to the <code>sdm audit</code> output for approval workflows.</td></tr><tr><td>2025-07-25</td><td>Control Plane</td><td>109.95.0</td><td>This release fixes an issue that caused resources not to be accessible on clients when MFA unlocked the client from the CLI.</td></tr><tr><td>2025-07-23</td><td>Control Plane</td><td>109.73.0</td><td>This release addresses an issue where ServiceNow resources were being marked inactive incorrectly in the ServiceNow table.</td></tr><tr><td>2025-07-23</td><td>Control Plane</td><td>109.69.0</td><td>This release updates Entitlements to request needed conditionally rendered data in a modal.</td></tr><tr><td>2025-07-22</td><td>CLI</td><td>49.55.0</td><td>This release fixes an issue where the <code>sdm doctor</code> diagnostics report would timeout in organizations with more than 10 gateways configured.</td></tr><tr><td>2025-07-21</td><td>Control Plane</td><td>109.51.0</td><td>This release adds RSA ID Plus as a new MFA provider.</td></tr><tr><td>2025-07-18</td><td>Control Plane</td><td>109.44.0</td><td>This release deprecates Kubernetes User Impersonation resources.</td></tr><tr><td>2025-07-18</td><td>Control Plane</td><td>109.28.0</td><td>This release addresses an issue where provisioned Google groups would stop syncing after a provisioned group was deleted.</td></tr><tr><td>2025-07-17</td><td>Control Plane</td><td>109.19.0</td><td>For admins, this release updates the workflow reference on an access request details page to link to that workflow.</td></tr><tr><td>2025-07-17</td><td>Control Plane</td><td>109.17.0</td><td>This release adds checks preventing the sending of emails to addresses and domains that bounce. Admins will be notified when an email is limited to allow for remediation.</td></tr><tr><td>2025-07-17</td><td>Control Plane</td><td>109.16.0</td><td>This release adds Asset ID support to GraphQL Node resolver to enable proper pagination, adds new managedResources resolver with pagination support, and adds the managed resource table to the Asset Details Page in the Admin UI.</td></tr><tr><td>2025-07-16</td><td>Control Plane</td><td>109.6.0</td><td>This release fixes issue where the More option when selecting approvers for a workflow was causing the combobox to break.</td></tr><tr><td>2025-07-14</td><td>CLI</td><td>49.35.0</td><td>During scheduled maintenance windows, workers within a proxy cluster now coordinate automatic updates with each other to ensure only one worker at a time is down within the cluster. Every worker within the cluster must be configured with the same maintenance window.</td></tr><tr><td>2025-07-14</td><td>Control Plane</td><td>108.78.0</td><td>During scheduled maintenance windows, workers within a proxy cluster now coordinate automatic updates with each other to ensure only one worker at a time is down within the cluster. Every worker within the cluster must be configured with the same maintenance window.</td></tr><tr><td>2025-07-14</td><td>Control Plane</td><td>108.77.0</td><td>This release updates the Access Workflow editor to respect the organization's access rule quota.</td></tr><tr><td>2025-07-11</td><td>Desktop Application</td><td>22.70.0</td><td>This release improves rendering changes in the Admin UI's resource list, resulting in reduced layout shift, a more responsive feel, and a more performant UI experience.</td></tr><tr><td>2025-07-10</td><td>Control Plane</td><td>108.52.0</td><td>This release adds an extended timeout for the access catalog page and creating access requests in the Admin UI.</td></tr><tr><td>2025-07-09</td><td>Control Plane</td><td>108.41.0</td><td>This release changes how unused tags are handled, so any tags that have not been used for 90 days or more will now be automatically deleted.</td></tr><tr><td>2025-07-09</td><td>CLI</td><td>49.26.0</td><td>When shutting down for update and configured with <code>SDM_ORCHESTRATOR_PROBES</code>, proxy workers now shut down the orchestrator probes and wait 90 seconds for connections to drain before completing the graceful shutdown.</td></tr><tr><td>2025-07-08</td><td>Control Plane</td><td>108.31.0</td><td>This release fixes an issue with some log aggregators where 64-bit integers could become truncated by switching to string representations where possible.</td></tr><tr><td>2025-07-07</td><td>CLI</td><td>49.21.0</td><td>This release updates many CLI commands so that they now report a more informative error message when permission is denied due to an MFA unlock requirement.</td></tr><tr><td>2025-07-07</td><td>Control Plane</td><td>108.10.0</td><td>This release updates the Admin UI with diagnostic download buttons on the Gateways, Relays, and Proxy Clusters pages, which allow administrators to download bulk diagnostics and logs for many nodes at once.</td></tr><tr><td>2025-07-07</td><td>Control Plane</td><td>108.3.0</td><td>This release updates secret engines to be automatically health checked.</td></tr><tr><td>2025-07-07</td><td>CLI</td><td>49.18.0</td><td>This release updates secret engines to be automatically health checked.</td></tr><tr><td>2025-07-03</td><td>Control Plane</td><td>107.93.0</td><td>This release adds a <code>kind</code> filter to the Assets table and renames the <code>type</code> column to <code>kind</code>.</td></tr><tr><td>2025-07-03</td><td>Control Plane</td><td>107.87.0</td><td>This release updates resource counts that appear under <strong>Requests</strong> > <strong>Catalog</strong> in the Admin UI to now correctly include only resources from enabled workflows.</td></tr><tr><td>2025-07-01</td><td>Control Plane</td><td>107.76.0</td><td>This release fixes an issue where the download for managed secret reports was missing read logs.</td></tr><tr><td>2025-07-01</td><td>Control Plane</td><td>107.74.0</td><td>This release fixes the AD Secret Engine configuration form to no longer require the <strong>Password</strong> field.</td></tr><tr><td>2025-06-30</td><td>Desktop Application</td><td>22.63.0</td><td>This release fixes an issue that caused the desktop app to get stuck "Waiting for connection" after login.</td></tr><tr><td>2025-06-30</td><td>Control Plane</td><td>107.61.0</td><td>This release updates the <strong>Log Encryption</strong> tab under <strong>Settings</strong> > <strong>Security</strong> to allow finer control of what types of logs get stored with StrongDM.</td></tr><tr><td>2025-06-30</td><td>Control Plane</td><td>107.55.0</td><td>This release allows organization data structures accessed through the Go, Java, Python, or Ruby SDKs to now expose their logging configuration settings through a nested <code>log_config</code> member. This structure will also expose per-log-category configuration for log data stored with StrongDM. The existing fields have been marked deprecated.</td></tr><tr><td>2025-06-30</td><td>Java SDK</td><td>15.2.0</td><td>This release allows organization data structures accessed through the Go, Java, Python, or Ruby SDKs to now expose their logging configuration settings through a nested <code>log_config</code> member. This structure will also expose per-log-category configuration for log data stored with StrongDM. The existing fields have been marked deprecated.</td></tr><tr><td>2025-06-30</td><td>Python SDK</td><td>15.2.0</td><td>This release allows organization data structures accessed through the Go, Java, Python, or Ruby SDKs to now expose their logging configuration settings through a nested <code>log_config</code> member. This structure will also expose per-log-category configuration for log data stored with StrongDM. The existing fields have been marked deprecated.</td></tr><tr><td>2025-06-30</td><td>Go SDK</td><td>15.2.0</td><td>This release allows organization data structures accessed through the Go, Java, Python, or Ruby SDKs to now expose their logging configuration settings through a nested <code>log_config</code> member. This structure will also expose per-log-category configuration for log data stored with StrongDM. The existing fields have been marked deprecated.</td></tr><tr><td>2025-06-30</td><td>Ruby SDK</td><td>15.2.0</td><td>This release allows organization data structures accessed through the Go, Java, Python, or Ruby SDKs to now expose their logging configuration settings through a nested <code>log_config</code> member. This structure will also expose per-log-category configuration for log data stored with StrongDM. The existing fields have been marked deprecated.</td></tr><tr><td>2025-06-27</td><td>Control Plane</td><td>107.48.0</td><td>This release updates the Admin UI pages for Users, Gateways, and Relays with Download Diagnostics buttons, which download a zip file containing detailed diagnostic information including logs and metrics. These buttons are only visible to administrators. If the client or node is offline, or if they are running a CLI version below 47.81.0, no information will be reported.</td></tr><tr><td>2025-06-26</td><td>CLI</td><td>48.94.0</td><td>This release updates the <code>sdm kubernetes update-config</code> command to respect the <code>KUBECONFIG</code> environment variable. If <code>KUBECONFIG</code> is set, the command updates the first path listed. If not, it defaults to the standard kubeconfig location for your OS.</td></tr><tr><td>2025-06-25</td><td>Control Plane</td><td>107.31.0</td><td>This release fixes an issue where certificate authorities were showing up as options when creating secret engines.</td></tr><tr><td>2025-06-25</td><td>CLI</td><td>48.93.0</td><td>This release adds support for Aerospike, a distributed NoSQL database. Aerospike resources can now be created through the Admin UI, CLI, SDKs, and Terraform.</td></tr><tr><td>2025-06-25</td><td>Control Plane</td><td>107.30.0</td><td>This release adds support for Aerospike, a distributed NoSQL database. Aerospike resources can now be created through the Admin UI, CLI, SDKs, and Terraform.</td></tr><tr><td>2025-06-25</td><td>Terraform Provider</td><td>14.26.0</td><td>This release adds support for Aerospike, a distributed NoSQL database. Aerospike resources can now be created through the Admin UI, CLI, SDKs, and Terraform.</td></tr><tr><td>2025-06-25</td><td>Java SDK</td><td>15.1.0</td><td>This release adds support for Aerospike, a distributed NoSQL database. Aerospike resources can now be created through the Admin UI, CLI, SDKs, and Terraform.</td></tr><tr><td>2025-06-25</td><td>Python SDK</td><td>15.1.0</td><td>This release adds support for Aerospike, a distributed NoSQL database. Aerospike resources can now be created through the Admin UI, CLI, SDKs, and Terraform.</td></tr><tr><td>2025-06-25</td><td>Ruby SDK</td><td>15.1.0</td><td>This release adds support for Aerospike, a distributed NoSQL database. Aerospike resources can now be created through the Admin UI, CLI, SDKs, and Terraform.</td></tr><tr><td>2025-06-25</td><td>Go SDK</td><td>15.1.0</td><td>This release adds support for Aerospike, a distributed NoSQL database. Aerospike resources can now be created through the Admin UI, CLI, SDKs, and Terraform.</td></tr><tr><td>2025-06-24</td><td>CLI</td><td>48.92.0</td><td>This release removes the workflow assignments and workflow assignments history services due to low utilization and server-side design changes. Older versions of the SDK will no longer be able to use these services. Admins can still determine what resources are attached to each workflow by examining the access rules for that workflow. The corresponding CLI commands <code>sdm admin workflow list workflow-assignments</code> and <code>sdm audit workflow-assignments</code> are also removed.</td></tr><tr><td>2025-06-24</td><td>Control Plane</td><td>107.27.0</td><td>This release removes the workflow assignments and workflow assignments history services due to low utilization and server-side design changes. Older versions of the SDK will no longer be able to use these services. Admins can still determine what resources are attached to each workflow by examining the access rules for that workflow. The corresponding CLI commands <code>sdm admin workflow list workflow-assignments</code> and <code>sdm audit workflow-assignments</code> are also removed.</td></tr><tr><td>2025-06-24</td><td>Java SDK</td><td>15.0.0</td><td>This release removes the workflow assignments and workflow assignments history services due to low utilization and server-side design changes. Older versions of the SDK will no longer be able to use these services. Admins can still determine what resources are attached to each workflow by examining the access rules for that workflow. The corresponding CLI commands <code>sdm admin workflow list workflow-assignments</code> and <code>sdm audit workflow-assignments</code> are also removed.</td></tr><tr><td>2025-06-24</td><td>Go SDK</td><td>15.0.0</td><td>This release removes the workflow assignments and workflow assignments history services due to low utilization and server-side design changes. Older versions of the SDK will no longer be able to use these services. Admins can still determine what resources are attached to each workflow by examining the access rules for that workflow. The corresponding CLI commands <code>sdm admin workflow list workflow-assignments</code> and <code>sdm audit workflow-assignments</code> are also removed.</td></tr><tr><td>2025-06-24</td><td>Python SDK</td><td>15.0.0</td><td>This release removes the workflow assignments and workflow assignments history services due to low utilization and server-side design changes. Older versions of the SDK will no longer be able to use these services. Admins can still determine what resources are attached to each workflow by examining the access rules for that workflow. The corresponding CLI commands <code>sdm admin workflow list workflow-assignments</code> and <code>sdm audit workflow-assignments</code> are also removed.</td></tr><tr><td>2025-06-24</td><td>Ruby SDK</td><td>15.0.0</td><td>This release removes the workflow assignments and workflow assignments history services due to low utilization and server-side design changes. Older versions of the SDK will no longer be able to use these services. Admins can still determine what resources are attached to each workflow by examining the access rules for that workflow. The corresponding CLI commands <code>sdm admin workflow list workflow-assignments</code> and <code>sdm audit workflow-assignments</code> are also removed.</td></tr><tr><td>2025-06-24</td><td>Control Plane</td><td>107.21.0</td><td>This release adds Secret Engines and Secrets tabs to the Secret Management Settings page. It also adds the ability for admins to create, edit, and delete secret engines and secrets.</td></tr><tr><td>2025-06-24</td><td>CLI</td><td>48.89.0</td><td>This release updates the CLI to support installing SDM nodes (gateway and relay) through the node flag <code>sdm install --node</code>. This flag supports two aliases, <code>gateway</code> and <code>relay</code>, in order to install the StrongDM node. Example Usage: <code>sdm install --node</code> is the general usage to install a relay or gateway. You can, however, use more specific aliases like <code>sdm install --relay</code> or <code>sdm install --gateway</code> in order to install StrongDM nodes.</td></tr><tr><td>2025-06-23</td><td>CLI</td><td>48.84.0</td><td>This release fixes an issue when using a RDP certificate resource with an Active Directory Certificate Services Certificate Authority where a misconfiguration of the CA preventing certificates from being issued successfully may result in StrongDM nodes incorrectly handling that error and crashing. This has been fixed, so that certificate issue errors from ADCS are now handled and reported as health check errors. This release also fixes an issue where using a RDP Certificate resource with an Active Directory Certificate Services Certificate Authority with an IIS server configured with HTTP/2 enabled would cause resource health checks to fail with a HTTP_1_1_REQUIRED error due to IIS not supporting HTTP/2 with NTLM authentication. Previously, HTTP/2 had to be explicitly disabled in IIS when using ADCS with StrongDM. The StrongDM ADCS client now correctly issues an HTTP/1.1 request so the IIS configuration no longer has to be modified.</td></tr><tr><td>2025-06-20</td><td>Control Plane</td><td>107.2.0</td><td>This release fixes an issue that caused the desktop app with locked authentication to unnecessarily require a fresh login on restart.</td></tr><tr><td>2025-06-20</td><td>CLI</td><td>48.81.0</td><td>This release fixes an issue where proxy clusters did not determine the source client IP address properly.</td></tr><tr><td>2025-06-20</td><td>CLI</td><td>48.76.0</td><td>With this release, Oracle resources now support connecting via JDBC versions that are newer than 23.2.0.0 all the way up to the latest. Versions with newly added support (JDK 8 and 11) are 23.3.0.23.09, 23.4.0.24.05, 23.5.0.24.07, 23.6.0.24.10, 23.7.0.25.01, and 23.8.0.25.04.</td></tr><tr><td>2025-06-20</td><td>CLI</td><td>48.75.0</td><td>This release makes the Trino datasource type generally available.</td></tr><tr><td>2025-06-20</td><td>Control Plane</td><td>106.91.0</td><td>This release makes the Trino datasource type generally available.</td></tr><tr><td>2025-06-20</td><td>Terraform Provider</td><td>14.25.0</td><td>This release makes the Trino datasource type generally available.</td></tr><tr><td>2025-06-20</td><td>Java SDK</td><td>14.25.0</td><td>This release makes the Trino datasource type generally available.</td></tr><tr><td>2025-06-20</td><td>Python SDK</td><td>14.25.0</td><td>This release makes the Trino datasource type generally available.</td></tr><tr><td>2025-06-20</td><td>Go SDK</td><td>14.25.0</td><td>This release makes the Trino datasource type generally available.</td></tr><tr><td>2025-06-20</td><td>Ruby SDK</td><td>14.25.0</td><td>This release makes the Trino datasource type generally available.</td></tr><tr><td>2025-06-20</td><td>Control Plane</td><td>106.90.0</td><td>This release adds TLS support to DB2 LUW. It can be enabled by checking the <code>Require TLS</code> option.</td></tr><tr><td>2025-06-20</td><td>CLI</td><td>48.74.0</td><td>This release adds TLS support to DB2 LUW. It can be enabled by checking the <code>Require TLS</code> option.</td></tr><tr><td>2025-06-20</td><td>Terraform Provider</td><td>14.24.0</td><td>This release adds TLS support to DB2 LUW. It can be enabled by checking the <code>Require TLS</code> option.</td></tr><tr><td>2025-06-20</td><td>Java SDK</td><td>14.24.0</td><td>This release adds TLS support to DB2 LUW. It can be enabled by checking the <code>Require TLS</code> option.</td></tr><tr><td>2025-06-20</td><td>Python SDK</td><td>14.24.0</td><td>This release adds TLS support to DB2 LUW. It can be enabled by checking the <code>Require TLS</code> option.</td></tr><tr><td>2025-06-20</td><td>Go SDK</td><td>14.24.0</td><td>This release adds TLS support to DB2 LUW. It can be enabled by checking the <code>Require TLS</code> option.</td></tr><tr><td>2025-06-20</td><td>Ruby SDK</td><td>14.24.0</td><td>This release adds TLS support to DB2 LUW. It can be enabled by checking the <code>Require TLS</code> option.</td></tr><tr><td>2025-06-17</td><td>Desktop Application</td><td>22.58.0</td><td>This release enhances the copy menu for resources in the StrongDM Desktop application to allow copying the IP address, with or without the port, of resources using the Virtual Networking Mode feature. This release also includes the ability to copy only the IP address for all resources, plus minor changes to the names of the menu items to improve clarity.</td></tr><tr><td>2025-06-17</td><td>Desktop Application</td><td>22.57.0</td><td>This release fixes an issue where clicking the <code>Restart</code> action in an update notification doesn't trigger the desktop app to install and restart.</td></tr><tr><td>2025-06-16</td><td>Desktop Application</td><td>22.56.0</td><td>When using the Virtual Networking Mode feature, the StrongDM Desktop application now displays the IP address through which VNM-enabled resources may be accessed, alongside the resource's assigned hostname. There are no changes to the display of loopback and HTTP resources.</td></tr><tr><td>2025-06-16</td><td>CLI</td><td>48.63.0</td><td>This release updates <code>sdm status</code> to display the fully qualified domain name through which resources using the Virtual Networking Mode feature can be accessed. This field is not displayed when VNM is not enabled. In addition, <code>sdm status</code> now displays the status, resource type, and local bind address for website resources, similar to the existing output for other types of resources.</td></tr><tr><td>2025-06-16</td><td>Terraform Provider</td><td>14.23.0</td><td>This release updates the SDKs and Terraform provider to expose the PortOverride field in HTTPBasicAuth, HTTPNoAuth, and HTTPAuth resources, allowing the local port used by clients to connect to the resource to be explicitly specified, as with other resource types. Previously this field was exposed in the Admin UI and CLI interfaces for these resource types, but was not available in the SDKs.</td></tr><tr><td>2025-06-16</td><td>Java SDK</td><td>14.23.0</td><td>This release updates the SDKs and Terraform provider to expose the PortOverride field in HTTPBasicAuth, HTTPNoAuth, and HTTPAuth resources, allowing the local port used by clients to connect to the resource to be explicitly specified, as with other resource types. Previously this field was exposed in the Admin UI and CLI interfaces for these resource types, but was not available in the SDKs.</td></tr><tr><td>2025-06-16</td><td>Python SDK</td><td>14.23.0</td><td>This release updates the SDKs and Terraform provider to expose the PortOverride field in HTTPBasicAuth, HTTPNoAuth, and HTTPAuth resources, allowing the local port used by clients to connect to the resource to be explicitly specified, as with other resource types. Previously this field was exposed in the Admin UI and CLI interfaces for these resource types, but was not available in the SDKs.</td></tr><tr><td>2025-06-16</td><td>Go SDK</td><td>14.23.0</td><td>This release updates the SDKs and Terraform provider to expose the PortOverride field in HTTPBasicAuth, HTTPNoAuth, and HTTPAuth resources, allowing the local port used by clients to connect to the resource to be explicitly specified, as with other resource types. Previously this field was exposed in the Admin UI and CLI interfaces for these resource types, but was not available in the SDKs.</td></tr><tr><td>2025-06-16</td><td>Ruby SDK</td><td>14.23.0</td><td>This release updates the SDKs and Terraform provider to expose the PortOverride field in HTTPBasicAuth, HTTPNoAuth, and HTTPAuth resources, allowing the local port used by clients to connect to the resource to be explicitly specified, as with other resource types. Previously this field was exposed in the Admin UI and CLI interfaces for these resource types, but was not available in the SDKs.</td></tr><tr><td>2025-06-13</td><td>Control Plane</td><td>106.33.0</td><td>This release adds the ability to delete a connector to the connector actions menu in the Admin UI.</td></tr><tr><td>2025-06-13</td><td>Control Plane</td><td>106.28.0</td><td>This release introduces the crawl interval to connector create and update forms.</td></tr><tr><td>2025-06-13</td><td>Desktop Application</td><td>22.54.0</td><td>This release fixes an issue where cloud CLI and TCP resources would not display the resource hostname/IP address and port through which those resources can be accessed in the desktop app.</td></tr><tr><td>2025-06-13</td><td>CLI</td><td>48.60.0</td><td>This release fixes an issue where cloud CLI and TCP resources would not display the resource hostname/IP address and port through which those resources can be accessed in the desktop app.</td></tr><tr><td>2025-06-13</td><td>Control Plane</td><td>106.24.0</td><td>This release fixes an issue where cloud CLI and TCP resources would not display the resource hostname/IP address and port through which those resources can be accessed in the desktop app.</td></tr><tr><td>2025-06-12</td><td>CLI</td><td>48.59.0</td><td>This release fixes an issue where Microsoft SQL Server (Azure AD) and Microsoft SQL Server (Kerberos) resources would fail to successfully health check or allow client connections to SQL Server instances configured to redirect rather than proxy client connections to the target SQL Server instance.</td></tr><tr><td>2025-06-12</td><td>Control Plane</td><td>106.1.0</td><td>This release adds support for query metadata including backend PID and Session Start Time to be available with the Postgres driver.</td></tr><tr><td>2025-06-12</td><td>CLI</td><td>48.54.0</td><td>This release adds support for query metadata including backend PID and Session Start Time to be available with the Postgres driver.</td></tr><tr><td>2025-06-12</td><td>CLI</td><td>48.53.0</td><td>This release adds session start time in metadata for MSSQL driver queries.</td></tr><tr><td>2025-06-12</td><td>Control Plane</td><td>106.0.0</td><td>This release updates the <code>legacyResourceFragment</code> to include <code>entityId</code> and updates fragment and generated files from the fragment.</td></tr><tr><td>2025-06-11</td><td>Control Plane</td><td>105.97.0</td><td>This release introduces sortable columns to the Connectors table in the Admin UI.</td></tr><tr><td>2025-06-11</td><td>CLI</td><td>48.50.0</td><td>This release adds support for key pair authentication for the Snowflake driver.</td></tr><tr><td>2025-06-11</td><td>Java SDK</td><td>14.22.0</td><td>This release adds support for key pair authentication for Snowflake.</td></tr><tr><td>2025-06-11</td><td>Python SDK</td><td>14.22.0</td><td>This release adds support for key pair authentication for Snowflake.</td></tr><tr><td>2025-06-11</td><td>Ruby SDK</td><td>14.22.0</td><td>This release adds support for key pair authentication for Snowflake.</td></tr><tr><td>2025-06-11</td><td>Go SDK</td><td>14.22.0</td><td>This release adds support for key pair authentication for Snowflake.</td></tr><tr><td>2025-06-09</td><td>Control Plane</td><td>105.74.0</td><td>This release fixes an issue where CLI output could not be displayed after granting temporary access.</td></tr><tr><td>2025-06-09</td><td>CLI</td><td>48.45.0</td><td>This release fixes an issue where CLI output could not be displayed after granting temporary access.</td></tr><tr><td>2025-06-09</td><td>CLI</td><td>48.42.0</td><td>This release fixes an issue where a failure during an update of the StrongDM client may sometimes leave temporary update files in /tmp.</td></tr><tr><td>2025-06-09</td><td>Control Plane</td><td>105.66.0</td><td>This release updates the Network > Gateways and Network > Relays pages of the Admin UI to display the last heartbeat time for nodes that are offline, instead of "unknown".</td></tr><tr><td>2025-06-09</td><td>Control Plane</td><td>105.64.0</td><td>This release fixes an issue where the Policies Logs page in the Admin UI may sometimes fail to show any results due to a timeout in retrieving logs from the StrongDM control plane.</td></tr><tr><td>2025-06-09</td><td>Control Plane</td><td>105.63.0</td><td>This release fixes incorrect URLs in device trust and user self-sign up notification emails.</td></tr><tr><td>2025-06-09</td><td>CLI</td><td>48.41.0</td><td>This release fixes an issue introduced in CLI version 48.5.0 where the CLI may fail to connect to the StrongDM control plane in an environment where the AWS root certificate authorities are not present in the operating system root CA store.</td></tr><tr><td>2025-06-05</td><td>Control Plane</td><td>105.52.0</td><td>This release fixes an issue where tags would appear to update in workflows but would not actually get updated.</td></tr><tr><td>2025-06-04</td><td>Control Plane</td><td>105.35.0</td><td>This release includes minor improvements to the display of logs in the Admin UI when using public key encryption for remote logs or not storing logs to StrongDM. All logs pages now clearly indicate when logs are encrypted and display the hash of the log when encrypted or not stored, matching the existing behavior of the Queries log page.</td></tr><tr><td>2025-06-03</td><td>CLI</td><td>48.26.0</td><td>This release updates Oracle resources to support connecting via JDBC versions that are newer than 23.2.0.0 all the way up to the latest. Versions with the newly added support (JDK 8 and 11) are 23.3.0.23.09, 23.4.0.24.05, 23.5.0.24.07, 23.6.0.24.10, 23.7.0.25.01, and 23.8.0.25.04.</td></tr><tr><td>2025-06-02</td><td>CLI</td><td>48.19.0</td><td>This release updates StrongDM to now accept PKCS8-formatted RSA private keys in addition to PKCS1 when decrypting data using the CLI.</td></tr><tr><td>2025-05-30</td><td>Desktop Application</td><td>22.38.0</td><td>This release fixes an issue that prevented users with two dots in their email address from logging in.</td></tr><tr><td>2025-05-30</td><td>CLI</td><td>48.15.0</td><td>This release updates the CLI so that <code>sdm install --worker</code> now sets the worker to send logs to <code>journald</code>. Instead of tailing <code>~/.sdm/sdm.log</code>, you can now see logs via <code>journalctl -fu sdm-worker</code>. <code>sdm install</code> and <code>sdm install --relay</code> remain unchanged. Workers that have already been installed via <code>sdm install --worker</code> will continue to send logs to <code>~/.sdm/sdm.log</code>. This release also fixes an issue that prevented workers from rotating this log file.</td></tr><tr><td>2025-05-29</td><td>CLI</td><td>48.13.0</td><td>This release fixes an issue with the Kubernetes driver where interactive sessions may continue to consume some memory on nodes and prevent a node from shutting down cleanly after the connection is closed. In addition, this release fixes an issue with the RDP driver where connections aborted early may continue to consume some memory on nodes and prevent a node from shutting down cleanly after the connection is closed.</td></tr><tr><td>2025-05-29</td><td>Desktop Application</td><td>22.37.0</td><td>This release fixes an issue with locking. When executing <code>sdm lock</code> from the CLI, the desktop app now shows the locked state screen, allowing the user to unlock via the desktop app.</td></tr><tr><td>2025-05-28</td><td>CLI</td><td>48.5.0</td><td>This release updates the CLI so that when communicating with the control plane, the CLI now trusts the root certificates stored in the operating system trust store, in addition to the Amazon AWS root certificates that it previously pinned.</td></tr><tr><td>2025-05-28</td><td>CLI</td><td>48.3.0</td><td>This release adds the missing Type column to the output of the <code>sdm admin nodes list</code> CLI command.</td></tr><tr><td>2025-05-27</td><td>CLI</td><td>48.1.0</td><td>This release makes the session ID of query tracking available through metadata for the MSSQL driver. Use the <code>sdm audit queries</code> CLI command to check.</td></tr><tr><td>2025-05-27</td><td>Control Plane</td><td>104.69.0</td><td>This release makes the session ID of query tracking available through metadata for the MSSQL driver. Use the <code>sdm audit queries</code> CLI command to check.</td></tr><tr><td>2025-05-23</td><td>CLI</td><td>47.98.0</td><td>This release allows requests that result in a rate limit error to be retried indefinitely until the deadline, if any, is reached. Retries now use exponential backoff to improve reliability.</td></tr><tr><td>2025-05-23</td><td>Terraform Provider</td><td>14.20.0</td><td>This release allows requests that result in a rate limit error to be retried indefinitely until the deadline, if any, is reached. Retries now use exponential backoff to improve reliability.</td></tr><tr><td>2025-05-23</td><td>Python SDK</td><td>14.20.0</td><td>This release allows requests that result in a rate limit error to be retried indefinitely until the deadline, if any, is reached. Retries now use exponential backoff to improve reliability.</td></tr><tr><td>2025-05-23</td><td>Go SDK</td><td>14.20.0</td><td>This release allows requests that result in a rate limit error to be retried indefinitely until the deadline, if any, is reached. Retries now use exponential backoff to improve reliability.</td></tr><tr><td>2025-05-23</td><td>Ruby SDK</td><td>14.20.0</td><td>This release allows requests that result in a rate limit error to be retried indefinitely until the deadline, if any, is reached. Retries now use exponential backoff to improve reliability.</td></tr><tr><td>2025-05-23</td><td>Terraform Provider</td><td>14.18.1</td><td>This release adds a custom resource type called <code>sdm_managed_secret_value</code> that will provide an encrypted value for the creation of managed_secrets. Values of <code>sdm_secret_engine</code>, <code>public_key</code> attribute, and <code>sdm_managed_secret.value</code> are now Base64-encoded.</td></tr><tr><td>2025-05-22</td><td>CLI</td><td>47.93.0</td><td>Support for <code>PasswordAuthenticator</code> in Cassandra driver.</td></tr><tr><td>2025-05-21</td><td>Desktop Application</td><td>22.32.0</td><td>This release fixes an issue where the desktop app login screen would get stuck and the user could not log in.</td></tr><tr><td>2025-05-21</td><td>Control Plane</td><td>104.45.0</td><td>This release adds an online status indicator on the proxy cluster details page of the Admin UI. In addition, this release fixes an issue preventing database operators and database administrators from viewing proxy clusters in the Admin UI.</td></tr><tr><td>2025-05-21</td><td>CLI</td><td>47.86.0</td><td>This release adds the TLS Required checkbox for Trino. If turned on, StrongDM is able to grant access to Trino running over HTTPS. If disabled it will be able to connect through HTTP.</td></tr><tr><td>2025-05-21</td><td>Control Plane</td><td>104.43.0</td><td>This release adds the TLS Required checkbox for Trino. If turned on, StrongDM is able to grant access to Trino running over HTTPS. If disabled it will be able to connect through HTTP.</td></tr><tr><td>2025-05-21</td><td>Terraform Provider</td><td>14.15.0</td><td>This release adds a new sdm_rdp_ca_pubkey data source in the Terraform provider, exposing the Public Key of the StrongDM RDP CA for Terraform workflows. No migrations are needed. Users can simply add a new data source for the Terraform provider.</td></tr><tr><td>2025-05-20</td><td>Desktop Application</td><td>22.31.0</td><td>This release fixes an issue where, when users freshly installed the desktop app, a failure might occur on load that would prevent the user from logging in for the first time.</td></tr><tr><td>2025-05-20</td><td>CLI</td><td>47.85.0</td><td>This release adds support for Oracle JDBC 23.2.0.0 thin clients with the Oracle driver.</td></tr><tr><td>2025-05-19</td><td>Control Plane</td><td>104.31.0</td><td>This release enables approval workflows to be defined, which specify an approver by their relationship to the requester. Specifically, the approver can be the requester's manager, and their manager's manager. A user's manager is resolved from SCIM data if present and can be manually overridden or set if needed.</td></tr><tr><td>2025-05-19</td><td>Control Plane</td><td>104.30.0</td><td>This release allows you to audit historical data on the SCIM metadata field and the ManagerID field for StrongDM users from the CLI using the <code>sdm audit users</code> CLI command.</td></tr><tr><td>2025-05-19</td><td>CLI</td><td>47.83.0</td><td>This release allows for auditing of historical data on the SCIM metadata field and the ManagerID field for StrongDM users from the CLI using the <code>sdm audit users</code> CLI command.</td></tr><tr><td>2025-05-19</td><td>CLI</td><td>47.81.0</td><td>This release fixes an issue with proxy cluster diagnostics that caused them to fail when ICMP was blocked. Bridged proxy workers now refuse to start if they cannot connect to the bridge within 5 seconds. Additional diagnostics have been added specifically for bridged proxy clusters.</td></tr><tr><td>2025-05-16</td><td>Control Plane</td><td>104.24.0</td><td>This release adds Proxy Cluster ID as an extended column in resource list CLI commands. In addition, this release fixes an issue where the <code>sdm admin nodes list</code> CLI command showed no reachable resources for proxy clusters.</td></tr><tr><td>2025-05-16</td><td>CLI</td><td>47.80.0</td><td>This release adds Proxy Cluster ID as an extended column in resource list CLI commands. In addition, this release fixes an issue with the <code>sdm admin nodes list</code> CLI command, where no reachable resources for proxy clusters were shown.</td></tr><tr><td>2025-05-16</td><td>Control Plane</td><td>104.21.0</td><td>This release allows the history of the managerID field on Accounts Users objects to be audited. The snapshot functionality of the Accounts SDK provides the ability to check the state of the managerID field on accounts at a particular point in time, and the Accounts History SDK provides the ability to check all past states of the managerID field on an account between two points in time.</td></tr><tr><td>2025-05-15</td><td>CLI</td><td>47.77.0</td><td>This release fixes an issue with bridge workers and third-party certificates with multiple DNS names.</td></tr><tr><td>2025-05-15</td><td>Desktop Application</td><td>22.27.1</td><td>This release fixes an issue where users in organizations using TOTP MFA could not unlock the desktop app. Note that users may have to log out and log back in if the update does not immediately fix the unlock issue. Users can do this by choosing "Logout" from the menu or by running "sdm logout" in the CLI. Closing the desktop app while in a locked state will also cause the user to be logged out.</td></tr><tr><td>2025-05-15</td><td>CLI</td><td>47.65.1</td><td>This release fixes an issue where users in organizations using TOTP MFA could not unlock the desktop app. Note that users may have to log out and log back in if the update does not immediately fix the unlock issue. Users can do this by choosing "Logout" from the menu or by running "sdm logout" in the CLI. Closing the desktop app while in a locked state will also cause the user to be logged out.</td></tr><tr><td>2025-05-15</td><td>CLI</td><td>47.49.1</td><td>This release removes an unused capability from the StrongDM System Service when using the Virtual Networking Mode feature that added the cloud proxy certificate to the system root certificate trust store when logged in to an organization with VNM enabled.</td></tr><tr><td>2025-05-15</td><td>CLI</td><td>47.22.1</td><td>This release adds support for IAM role-based authentication for Redshift Cluster and Redshift Serverless.</td></tr><tr><td>2025-05-15</td><td>Control Plane</td><td>103.90.1</td><td>This release fixes an issue where users in organizations using TOTP MFA could not unlock the desktop app. Note that users may have to log out and log back in if the update does not immediately fix the unlock issue. Users can do this by choosing "Logout" from the menu or by running "sdm logout" in the CLI. Closing the desktop app while in a locked state will also cause the user to be logged out.</td></tr><tr><td>2025-05-15</td><td>Control Plane</td><td>101.95.1</td><td>This release exposes the manager id field of a user in <code>sdm admin users list</code> and improves the formatting of SCIM data when the <code>--json</code> flag is used.</td></tr><tr><td>2025-05-15</td><td>Control Plane</td><td>102.36.1</td><td>This release adds support for IAM role-based authentication for Redshift Cluster and Redshift Serverless.</td></tr><tr><td>2025-05-15</td><td>CLI</td><td>47.12.1</td><td>This release exposes the manager id field of a user in <code>sdm admin users list</code> and improves the formatting of SCIM data when the <code>--json</code> flag is used.</td></tr><tr><td>2025-05-14</td><td>Desktop Application</td><td>22.29.0</td><td>This release fixes an issue where the resource Lock button was stuck in a disabled state after locking the resource.</td></tr><tr><td>2025-05-14</td><td>Control Plane</td><td>104.5.0</td><td>This release adds support for the EC2 and IAM authentication methods for HashiCorp Vault.</td></tr><tr><td>2025-05-14</td><td>CLI</td><td>47.76.0</td><td>This release adds support for the EC2 and IAM authentication methods for HashiCorp Vault.</td></tr><tr><td>2025-05-14</td><td>Terraform Provider</td><td>14.14.0</td><td>This release adds support for the EC2 and IAM authentication methods for HashiCorp Vault.</td></tr><tr><td>2025-05-14</td><td>Python SDK</td><td>14.14.0</td><td>This release adds support for the EC2 and IAM authentication methods for HashiCorp Vault.</td></tr><tr><td>2025-05-14</td><td>Ruby SDK</td><td>14.14.0</td><td>This release adds support for the EC2 and IAM authentication methods for HashiCorp Vault.</td></tr><tr><td>2025-05-14</td><td>Go SDK</td><td>14.14.0</td><td>This release adds support for the EC2 and IAM authentication methods for HashiCorp Vault.</td></tr><tr><td>2025-05-13</td><td>Control Plane</td><td>104.1.0</td><td>This release changes the name of the Trino driver.</td></tr><tr><td>2025-05-13</td><td>CLI</td><td>47.73.0</td><td>This release changes the name of the Trino driver.</td></tr><tr><td>2025-05-13</td><td>CLI</td><td>47.72.0</td><td>This release fixes an issue in the AWS Management Console resource where opening the resource may redirect to the AWS Console for a region different from what was configured in the resource.</td></tr><tr><td>2025-05-13</td><td>Control Plane</td><td>103.98.0</td><td>This release adds support for Oracle database connections via Native Network Encryption (NNE). This can be accessed via the new Oracle (NNE) datasource type.</td></tr><tr><td>2025-05-13</td><td>CLI</td><td>47.71.0</td><td>This release adds support for Oracle database connections via Native Network Encryption (NNE). This can be accessed via the new Oracle (NNE) datasource type.</td></tr><tr><td>2025-05-13</td><td>Terraform Provider</td><td>14.13.0</td><td>This release adds support for Oracle database connections via Native Network Encryption (NNE). This can be accessed via the new Oracle (NNE) datasource type.</td></tr><tr><td>2025-05-13</td><td>Python SDK</td><td>14.13.0</td><td>This release adds support for Oracle database connections via Native Network Encryption (NNE). This can be accessed via the new Oracle (NNE) datasource type.</td></tr><tr><td>2025-05-13</td><td>Ruby SDK</td><td>14.13.0</td><td>This release adds support for Oracle database connections via Native Network Encryption (NNE). This can be accessed via the new Oracle (NNE) datasource type.</td></tr><tr><td>2025-05-13</td><td>Go SDK</td><td>14.13.0</td><td>This release adds support for Oracle database connections via Native Network Encryption (NNE). This can be accessed via the new Oracle (NNE) datasource type.</td></tr><tr><td>2025-05-13</td><td>Control Plane</td><td>103.97.0</td><td>This release improves the wording used on error panels in the Microsoft Teams integration.</td></tr><tr><td>2025-05-12</td><td>Desktop Application</td><td>22.28.0</td><td>This release fixes an issue where users in organizations using TOTP MFA could not unlock the desktop app. Note that users may have to log out and log back in if the update does not immediately fix the unlock issue. Users can do this by choosing "Logout" from the menu or by running <code>sdm logout</code> in the CLI. Closing the desktop app while in a locked state will also cause the user to be logged out.</td></tr><tr><td>2025-05-12</td><td>CLI</td><td>47.66.0</td><td>This release fixes an issue where users in organizations using TOTP MFA could not unlock the desktop app. Note that users may have to log out and log back in if the update does not immediately fix the unlock issue. Users can do this by choosing "Logout" from the menu or by running <code>sdm logout</code> in the CLI. Closing the desktop app while in a locked state will also cause the user to be logged out.</td></tr><tr><td>2025-05-12</td><td>Control Plane</td><td>103.90.0</td><td>This release adds software and hardware TOTP support for RSA Secure ID Plus.</td></tr><tr><td>2025-05-09</td><td>CLI</td><td>47.63.0</td><td>This release fixes an issue that broke connections to Cassandra resources with the "TLS required" checkbox checked.</td></tr><tr><td>2025-05-09</td><td>Control Plane</td><td>103.85.0</td><td>This release corrects a previous server-side issue where customers could not unset the "manager_id" field on an accounts user object via the Go, Python, Ruby, or Java SDKs and the Terraform provider.</td></tr><tr><td>2025-05-09</td><td>Terraform Provider</td><td>14.11.0</td><td>This release corrects a previous server-side issue where customers could not unset the "manager_id" field on an accounts user object via the Go, Python, Ruby, or Java SDKs and the Terraform provider.</td></tr><tr><td>2025-05-09</td><td>Python SDK</td><td>14.11.0</td><td>This release corrects a previous server-side issue where customers could not unset the "manager_id" field on an accounts user object via the Go, Python, Ruby, or Java SDKs and the Terraform provider.</td></tr><tr><td>2025-05-09</td><td>Ruby SDK</td><td>14.11.0</td><td>This release corrects a previous server-side issue where customers could not unset the "manager_id" field on an accounts user object via the Go, Python, Ruby, or Java SDKs and the Terraform provider.</td></tr><tr><td>2025-05-09</td><td>Go SDK</td><td>14.11.0</td><td>This release corrects a previous server-side issue where customers could not unset the "manager_id" field on an accounts user object via the Go, Python, Ruby, or Java SDKs and the Terraform provider.</td></tr><tr><td>2025-05-08</td><td>Python SDK</td><td>14.10.0</td><td>This release updates the accounts users model to have a read-only field for SCIM data of an user. In addition, this release adds a new manager ID field to manually set the account ID of a user's manager. Lastly, the accounts users model now has a read-only field for retrieving the "resolved manager id". This is the ID of the user's manager derived from the manager_id, if present, or from the SCIM metadata. This field is only populated for results from the accounts get and list endpoints and is not returned for create and update, audit list, or history endpoint calls.</td></tr><tr><td>2025-05-08</td><td>Go SDK</td><td>14.10.0</td><td>This release updates the accounts users model to have a read-only field for SCIM data of an user. In addition, this release adds a new manager ID field to manually set the account ID of a user's manager. Lastly, the accounts users model now has a read-only field for retrieving the "resolved manager id". This is the ID of the user's manager derived from the manager_id, if present, or from the SCIM metadata. This field is only populated for results from the accounts get and list endpoints and is not returned for create and update, audit list, or history endpoint calls.</td></tr><tr><td>2025-05-08</td><td>Ruby SDK</td><td>14.10.0</td><td>This release updates the accounts users model to have a read-only field for SCIM data of an user. In addition, this release adds a new manager ID field to manually set the account ID of a user's manager. Lastly, the accounts users model now has a read-only field for retrieving the "resolved manager id". This is the ID of the user's manager derived from the manager_id, if present, or from the SCIM metadata. This field is only populated for results from the accounts get and list endpoints and is not returned for create and update, audit list, or history endpoint calls.</td></tr><tr><td>2025-05-07</td><td>Desktop Application</td><td>22.25.0</td><td>This release provides a login update, so login errors no longer require the user to change the email field to log in again when the email is prefilled.</td></tr><tr><td>2025-05-07</td><td>CLI</td><td>47.56.0</td><td>This release adds the <code>--proxy-cluster-id</code> flag to the <code>sdm admin servers create rawtcp</code> and <code>sdm admin servers update rawtcp</code> CLI commands, which were previously missing it.</td></tr><tr><td>2025-05-05</td><td>Control Plane</td><td>103.48.0</td><td>This release restores the permissions needed for an auditor to create and approve access requests.</td></tr><tr><td>2025-05-05</td><td>Control Plane</td><td>103.46.0</td><td>This release ensures that the Standing Access report in the Admin UI will not return undefined data that has the potential to kill the page.</td></tr><tr><td>2025-05-02</td><td>Control Plane</td><td>103.42.0</td><td>On-prem installations of the StrongDM Control Plane now require the database to be running at least Postgres 13.</td></tr><tr><td>2025-05-02</td><td>CLI</td><td>47.53.0</td><td>This release makes <code>sdm admin secretengines</code> and <code>sdm admin managedsecrets</code> CLI commands visible.</td></tr><tr><td>2025-05-01</td><td>CLI</td><td>47.50.0</td><td>This release removes an unused capability from the StrongDM System Service when using the Virtual Networking Mode (VNM) beta feature that added the cloud proxy certificate to the system root certificate trust store when logged in to an organization with VNM enabled.</td></tr><tr><td>2025-04-30</td><td>Control Plane</td><td>103.21.0</td><td>This release follows the recent addition of the <code>sdm admin approval-workflows-multistep</code> CLI commands, which make the following commands obsolete and removed: <code>sdm admin workflow create workflow-approver</code>, <code>sdm admin workflow list workflow-approvers</code>, and <code>sdm admin workflow delete workflow-approver</code>. In addition, this release adds a template for the <code>--access-rules</code> argument to the help text for the following commands: <code>sdm admin workflow create workflow</code> and <code>sdm admin workflow update workflow</code>. Lastly, this release adds access rules to text and JSON output of <code>sdm admin workflow list workflow</code> and removes the <code>AutoGrant</code> field from workflow listings.</td></tr><tr><td>2025-04-30</td><td>CLI</td><td>47.49.0</td><td>This release follows the recent addition of the <code>sdm admin approval-workflows-multistep</code> CLI commands, which make the following commands obsolete and removed: <code>sdm admin workflow create workflow-approver</code>, <code>sdm admin workflow list workflow-approvers</code>, and <code>sdm admin workflow delete workflow-approver</code>. In addition, this release adds a template for the <code>--access-rules</code> argument to the help text for the following commands: <code>sdm admin workflow create workflow</code> and <code>sdm admin workflow update workflow</code>. Lastly, this release adds access rules to text and JSON output of <code>sdm admin workflow list workflow</code> and removes the <code>AutoGrant</code> field from workflow listings.</td></tr><tr><td>2025-04-29</td><td>Control Plane</td><td>103.8.0</td><td>New MFA provider with push notifications: RSA ID Plus</td></tr><tr><td>2025-04-29</td><td>CLI</td><td>47.45.0</td><td>New MFA provider with push notifications: RSA ID Plus</td></tr><tr><td>2025-04-28</td><td>CLI</td><td>47.42.0</td><td>This release makes the Vertica datasource type generally available.</td></tr><tr><td>2025-04-28</td><td>Control Plane</td><td>103.1.0</td><td>This release makes the Vertica datasource type generally available.</td></tr><tr><td>2025-04-28</td><td>Terraform Provider</td><td>14.7.0</td><td>This release makes the Vertica datasource type generally available.</td></tr><tr><td>2025-04-28</td><td>Ruby SDK</td><td>14.7.0</td><td>This release makes the Vertica datasource type generally available.</td></tr><tr><td>2025-04-28</td><td>Python SDK</td><td>14.7.0</td><td>This release makes the Vertica datasource type generally available.</td></tr><tr><td>2025-04-28</td><td>Go SDK</td><td>14.7.0</td><td>This release makes the Vertica datasource type generally available.</td></tr><tr><td>2025-04-28</td><td>Desktop Application</td><td>22.23.0</td><td>This release fixes a login issue for US customers who encountered firewall restrictions that prevented their log in to StrongDM via the desktop app.</td></tr><tr><td>2025-04-25</td><td>CLI</td><td>47.41.0</td><td>This release fixes an issue in the rendering of RDP sessions where the cursor color would sometimes be displayed incorrectly in the rendered videos.</td></tr><tr><td>2025-04-25</td><td>CLI</td><td>47.40.0</td><td>This release updates the CLI by adding flags to set and unset the ManagerID field on a user account. In addition, this release adds a <code>--template</code> option to the <code>sdm admin user update</code> CLI command.</td></tr><tr><td>2025-04-25</td><td>CLI</td><td>47.39.0</td><td>This release improves DNS subdomain validation in the StrongDM System Service when using the Virtual Networking Mode beta feature to detect and disallow malformed input.</td></tr><tr><td>2025-04-25</td><td>Control Plane</td><td>102.93.0</td><td>This release updates the CLI by adding flags to set and unset the ManagerID field on a user account. In addition, this release adds a <code>--template</code> option to the <code>sdm admin user update</code> CLI command.</td></tr><tr><td>2025-04-25</td><td>Control Plane</td><td>102.92.0</td><td>This release fixes an issue where combo boxes on the Policy Editor would not display correctly.</td></tr><tr><td>2025-04-25</td><td>Control Plane</td><td>102.88.0</td><td>This release updates approval workflows to be able to be configured to specify a requester's manager or a requester's manager's manager as an approver. The resolution of whom the manager of the requester is is performed when the requester makes an access request.</td></tr><tr><td>2025-04-25</td><td>Terraform Provider</td><td>14.6.0</td><td>This release updates approval workflows to be able to be configured to specify a requester's manager or a requester's manager's manager as an approver. The resolution of whom the manager of the requester is is performed when the requester makes an access request.</td></tr><tr><td>2025-04-25</td><td>Python SDK</td><td>14.6.0</td><td>This release updates approval workflows to be able to be configured to specify a requester's manager or a requester's manager's manager as an approver. The resolution of whom the manager of the requester is is performed when the requester makes an access request.</td></tr><tr><td>2025-04-25</td><td>Go SDK</td><td>14.6.0</td><td>This release updates approval workflows to be able to be configured to specify a requester's manager or a requester's manager's manager as an approver. The resolution of whom the manager of the requester is is performed when the requester makes an access request.</td></tr><tr><td>2025-04-25</td><td>Ruby SDK</td><td>14.6.0</td><td>This release updates approval workflows to be able to be configured to specify a requester's manager or a requester's manager's manager as an approver. The resolution of whom the manager of the requester is is performed when the requester makes an access request.</td></tr><tr><td>2025-04-23</td><td>Desktop Application</td><td>22.22.0</td><td>This release resolves an issue that prevented the desktop app from logging in via Google SSO, where after authenticating with Google, the user would see a 404 page and not be authenticated in the desktop app.</td></tr><tr><td>2025-04-23</td><td>Control Plane</td><td>102.74.0</td><td>This release resolves an issue that prevented the desktop app from logging in via Google SSO, where after authenticating with Google, the user would see a 404 page and not be authenticated in the desktop app.</td></tr><tr><td>2025-04-22</td><td>Control Plane</td><td>102.71.0</td><td>This release fixes an issue with the StrongDM Jira integration where the end date of an access request grant was being incorrectly rendered in Jira.</td></tr><tr><td>2025-04-22</td><td>Control Plane</td><td>102.66.0</td><td>This release updates the CLI commands for approval workflows; specifically, the output heading for "ApproverIDs" has been changed to "Approvers" in the listings of approval workflow steps.</td></tr><tr><td>2025-04-21</td><td>CLI</td><td>47.30.0</td><td>This release adds the Oracle (NNE) datasource type, which provides support for Oracle datasources that have NNE enabled. StrongDM supports the AES-128, AES-192, AES-256, DES, RC4_40, RC4_128, and RC4_256 encryption algorithms; SHA-256, SHA-384, and SHA-512 checksum algorithms; and Oracle DB versions 12c to 19c.</td></tr><tr><td>2025-04-21</td><td>Control Plane</td><td>102.62.0</td><td>This release adds the Oracle (NNE) datasource type, which provides support for Oracle datasources that have NNE enabled. StrongDM supports the AES-128, AES-192, AES-256, DES, RC4_40, RC4_128, and RC4_256 encryption algorithms; SHA-256, SHA-384, and SHA-512 checksum algorithms; and Oracle DB versions 12c to 19c.</td></tr><tr><td>2025-04-21</td><td>Terraform Provider</td><td>14.4.0</td><td>This release adds Oracle (NNE) as a resource type. StrongDM supports the AES-128, AES-192, AES-256, DES, RC4_40, RC4_128, and RC4_256 encryption algorithms; SHA-256, SHA-384, and SHA-512 checksum algorithms; and Oracle DB versions 12c to 19c.</td></tr><tr><td>2025-04-21</td><td>Python SDK</td><td>14.4.0</td><td>This release adds Oracle (NNE) as a resource type. StrongDM supports the AES-128, AES-192, AES-256, DES, RC4_40, RC4_128, and RC4_256 encryption algorithms; SHA-256, SHA-384, and SHA-512 checksum algorithms; and Oracle DB versions 12c to 19c.</td></tr><tr><td>2025-04-21</td><td>Go SDK</td><td>14.4.0</td><td>This release adds Oracle (NNE) as a resource type. StrongDM supports the AES-128, AES-192, AES-256, DES, RC4_40, RC4_128, and RC4_256 encryption algorithms; SHA-256, SHA-384, and SHA-512 checksum algorithms; and Oracle DB versions 12c to 19c.</td></tr><tr><td>2025-04-21</td><td>Ruby SDK</td><td>14.4.0</td><td>This release adds Oracle (NNE) as a resource type. StrongDM supports the AES-128, AES-192, AES-256, DES, RC4_40, RC4_128, and RC4_256 encryption algorithms; SHA-256, SHA-384, and SHA-512 checksum algorithms; and Oracle DB versions 12c to 19c.</td></tr><tr><td>2025-04-21</td><td>Control Plane</td><td>102.57.0</td><td>This release updates the Admin UI to correctly display Jira or ServiceNow under the Request Details page.</td></tr><tr><td>2025-04-17</td><td>Control Plane</td><td>102.44.0</td><td>This release fixes an issue where some approval workflow audit records were associated with a nonexistent activity when using older versions of the CLI or SDK to manage approval workflows.</td></tr><tr><td>2025-04-17</td><td>CLI</td><td>47.26.0</td><td>This release adds the Oracle (NNE) datasource type, which provides support for Oracle datasources that have NNE enabled. StrongDM supports the AES-128, AES-192, AES-256, DES, RC4_40, RC4_128, and RC4_256 encryption algorithms; SHA-256, SHA-384, and SHA-512 checksum algorithms; and Oracle DB versions 12c to 19c.</td></tr><tr><td>2025-04-17</td><td>Control Plane</td><td>102.42.0</td><td>This release adds the Oracle (NNE) datasource type, which provides support for Oracle datasources that have NNE enabled. StrongDM supports the AES-128, AES-192, AES-256, DES, RC4_40, RC4_128, and RC4_256 encryption algorithms; SHA-256, SHA-384, and SHA-512 checksum algorithms; and Oracle DB versions 12c to 19c.</td></tr><tr><td>2025-04-17</td><td>Control Plane</td><td>102.37.0</td><td>This release adds support for Redshift Cluster and Redshift Serverless to use IAM role-based authentication.</td></tr><tr><td>2025-04-17</td><td>CLI</td><td>47.23.0</td><td>This release adds support for Redshift Cluster and Redshift Serverless to use IAM role-based authentication.</td></tr><tr><td>2025-04-17</td><td>Terraform Provider</td><td>14.3.0</td><td>This release adds support for Redshift Cluster and Redshift Serverless to use IAM role-based authentication.</td></tr><tr><td>2025-04-17</td><td>Python SDK</td><td>14.3.0</td><td>This release adds support for Redshift Cluster and Redshift Serverless to use IAM role-based authentication.</td></tr><tr><td>2025-04-17</td><td>Go SDK</td><td>14.3.0</td><td>This release adds support for Redshift Cluster and Redshift Serverless to use IAM role-based authentication.</td></tr><tr><td>2025-04-17</td><td>Ruby SDK</td><td>14.3.0</td><td>This release adds support for Redshift Cluster and Redshift Serverless to use IAM role-based authentication.</td></tr><tr><td>2025-04-15</td><td>Terraform Provider</td><td>14.2.0</td><td>This release fixes an issue with the <code>sdm admin approval-workflows update</code> CLI command in CLI versions prior to 47.3.0 and ApprovalWorkflows, where update SDK/Terraform calls in SDK versions prior to 14.0.0 would incorrectly remove all steps from a manual approval workflow. A consequence of this fix is the <code>sdm admin approval-workflows-multistep update</code> CLI command in CLI versions between 47.3.0 and 47.20.0 and the ApprovalWorkflows. Update SDK/Terraform call in SDK versions between 14.0.0 and 14.1.0 cannot be used to update the steps of an approval workflow. Please upgrade to CLI version 47.20.0 or higher, or SDK version 14.1.0 or higher.</td></tr><tr><td>2025-04-15</td><td>Control Plane</td><td>102.22.0</td><td>This release fixes an issue with the <code>sdm admin approval-workflows update</code> CLI command in CLI versions prior to 47.3.0 and ApprovalWorkflows, where update SDK/Terraform calls in SDK versions prior to 14.0.0 would incorrectly remove all steps from a manual approval workflow. A consequence of this fix is the <code>sdm admin approval-workflows-multistep update</code> CLI command in CLI versions between 47.3.0 and 47.20.0 and the ApprovalWorkflows. Update SDK/Terraform call in SDK versions between 14.0.0 and 14.1.0 cannot be used to update the steps of an approval workflow. Please upgrade to CLI version 47.20.0 or higher, or SDK version 14.1.0 or higher.</td></tr><tr><td>2025-04-15</td><td>Python SDK</td><td>14.2.0</td><td>This release fixes an issue with the <code>sdm admin approval-workflows update</code> CLI command in CLI versions prior to 47.3.0 and ApprovalWorkflows, where update SDK/Terraform calls in SDK versions prior to 14.0.0 would incorrectly remove all steps from a manual approval workflow. A consequence of this fix is the <code>sdm admin approval-workflows-multistep update</code> CLI command in CLI versions between 47.3.0 and 47.20.0 and the ApprovalWorkflows. Update SDK/Terraform call in SDK versions between 14.0.0 and 14.1.0 cannot be used to update the steps of an approval workflow. Please upgrade to CLI version 47.20.0 or higher, or SDK version 14.1.0 or higher.</td></tr><tr><td>2025-04-15</td><td>Go SDK</td><td>14.2.0</td><td>This release fixes an issue with the <code>sdm admin approval-workflows update</code> CLI command in CLI versions prior to 47.3.0 and ApprovalWorkflows, where update SDK/Terraform calls in SDK versions prior to 14.0.0 would incorrectly remove all steps from a manual approval workflow. A consequence of this fix is the <code>sdm admin approval-workflows-multistep update</code> CLI command in CLI versions between 47.3.0 and 47.20.0 and the ApprovalWorkflows. Update SDK/Terraform call in SDK versions between 14.0.0 and 14.1.0 cannot be used to update the steps of an approval workflow. Please upgrade to CLI version 47.20.0 or higher, or SDK version 14.1.0 or higher.</td></tr><tr><td>2025-04-15</td><td>Ruby SDK</td><td>14.2.0</td><td>This release fixes an issue with the <code>sdm admin approval-workflows update</code> CLI command in CLI versions prior to 47.3.0 and ApprovalWorkflows, where update SDK/Terraform calls in SDK versions prior to 14.0.0 would incorrectly remove all steps from a manual approval workflow. A consequence of this fix is the <code>sdm admin approval-workflows-multistep update</code> CLI command in CLI versions between 47.3.0 and 47.20.0 and the ApprovalWorkflows. Update SDK/Terraform call in SDK versions between 14.0.0 and 14.1.0 cannot be used to update the steps of an approval workflow. Please upgrade to CLI version 47.20.0 or higher, or SDK version 14.1.0 or higher.</td></tr><tr><td>2025-04-15</td><td>CLI</td><td>47.20.0</td><td>This release updates the CLI to remember the previously selected app domain even after logout.</td></tr><tr><td>2025-04-10</td><td>Terraform Provider</td><td>14.0.0</td><td>This release is a major SDK version bump that introduces enhanced approval workflows. The approval workflow steps and approval workflow approvers endpoints have been deprecated to introduce multistep approval workflow functionality through the approval workflow endpoint. Approval workflows can now be created with multiple approval steps and approvers using the approval workflows endpoint. In addition, you can now specify a "skip after" timeout on an approval step so that the step will auto-approve if no approval has been given after the specified time elapses. Another optional "quantifier" specifies whether any or all approvers need to approve for an approval step. The approval workflows history, approval workflows steps history, and approval workflow approvers history endpoints remain as-is for historical data queries.</td></tr><tr><td>2025-04-10</td><td>Go SDK</td><td>14.0.0</td><td>This release is a major SDK version bump that introduces enhanced approval workflows. The approval workflow steps and approval workflow approvers endpoints have been deprecated to introduce multistep approval workflow functionality through the approval workflow endpoint. Approval workflows can now be created with multiple approval steps and approvers using the approval workflows endpoint. In addition, you can now specify a "skip after" timeout on an approval step so that the step will auto-approve if no approval has been given after the specified time elapses. Another optional "quantifier" specifies whether any or all approvers need to approve for an approval step. The approval workflows history, approval workflows steps history, and approval workflow approvers history endpoints remain as-is for historical data queries.</td></tr><tr><td>2025-04-10</td><td>Python SDK</td><td>14.0.0</td><td>This release is a major SDK version bump that introduces enhanced approval workflows. The approval workflow steps and approval workflow approvers endpoints have been deprecated to introduce multistep approval workflow functionality through the approval workflow endpoint. Approval workflows can now be created with multiple approval steps and approvers using the approval workflows endpoint. In addition, you can now specify a "skip after" timeout on an approval step so that the step will auto-approve if no approval has been given after the specified time elapses. Another optional "quantifier" specifies whether any or all approvers need to approve for an approval step. The approval workflows history, approval workflows steps history, and approval workflow approvers history endpoints remain as-is for historical data queries.</td></tr><tr><td>2025-04-10</td><td>Ruby SDK</td><td>14.0.0</td><td>This release is a major SDK version bump that introduces enhanced approval workflows. The approval workflow steps and approval workflow approvers endpoints have been deprecated to introduce multistep approval workflow functionality through the approval workflow endpoint. Approval workflows can now be created with multiple approval steps and approvers using the approval workflows endpoint. In addition, you can now specify a "skip after" timeout on an approval step so that the step will auto-approve if no approval has been given after the specified time elapses. Another optional "quantifier" specifies whether any or all approvers need to approve for an approval step. The approval workflows history, approval workflows steps history, and approval workflow approvers history endpoints remain as-is for historical data queries.</td></tr><tr><td>2025-04-10</td><td>Control Plane</td><td>101.98.0</td><td>This release updates the "query" field in Log Stream query logs to include the complete query capture metadata for RDP and interactive SSH and Kubernetes sessions. Previously this field was empty for these queries. Additionally the <code>sdm replay rdp</code> CLI command now supports <code>--format logstream</code>, which allows auditing of RDP sessions captured by Log Stream.</td></tr><tr><td>2025-04-10</td><td>CLI</td><td>47.15.0</td><td>This release updates the "query" field in Log Stream query logs to include the complete query capture metadata for RDP and interactive SSH and Kubernetes sessions. Previously this field was empty for these queries. Additionally the <code>sdm replay rdp</code> CLI command now supports <code>--format logstream</code>, which allows auditing of RDP sessions captured by Log Stream.</td></tr><tr><td>2025-04-09</td><td>Control Plane</td><td>101.96.0</td><td>This release exposes the manager id field of a user in the <code>sdm admin users list</code> CLI command and improves the formatting of SCIM data when the <code>--json</code> flag is used.</td></tr><tr><td>2025-04-09</td><td>CLI</td><td>47.13.0</td><td>This release exposes the <code>manager id</code> field of a user in <code>sdm admin users list</code> and improves the formatting of SCIM data when the <code>--json</code> flag is used.</td></tr><tr><td>2025-04-09</td><td>Control Plane</td><td>101.95.0</td><td>This release updates SSH (Customer Managed Key) resources using Identity Aliases with a third-party secret store (not Strong Vault) to optionally use a different SSH private key for each Identity Alias. This is done by configuring the path to the private key in the secret store to include a <code>$SDM_USERNAME</code> variable that will be replaced at runtime with the Identity Alias of the connecting user (for example, <code>secrets/employees/$SDM_USERNAME?key=ssh-key</code>).</td></tr><tr><td>2025-04-08</td><td>Desktop Application</td><td>22.20.0</td><td>This release fixes an issue where when a user would relaunch the SSO login in a browser window, it would show an error that the token was already used.</td></tr><tr><td>2025-04-08</td><td>CLI</td><td>47.12.0</td><td>This release adds support for privilege levels on Leased Credentials clusters.</td></tr><tr><td>2025-04-08</td><td>Control Plane</td><td>101.88.0</td><td>This release adds SCIM metadata to the output from the <code>sdm admin users list</code> CLI command.</td></tr><tr><td>2025-04-08</td><td>CLI</td><td>47.11.0</td><td>This release adds SCIM metadata to the output from the <code>sdm admin users list</code> CLI command.</td></tr><tr><td>2025-04-08</td><td>CLI</td><td>47.10.0</td><td>This release adds support for Secret Engines and Managed Secrets in the SDKs.</td></tr><tr><td>2025-04-08</td><td>Control Plane</td><td>101.87.0</td><td>This release adds support for Secret Engines and Managed Secrets in the SDKs.</td></tr><tr><td>2025-04-08</td><td>Python SDK</td><td>13.12.0</td><td>This release adds support for Secret Engines and Managed Secrets in the SDKs.</td></tr><tr><td>2025-04-08</td><td>Ruby SDK</td><td>13.12.0</td><td>This release adds support for Secret Engines and Managed Secrets in the SDKs.</td></tr><tr><td>2025-04-08</td><td>Go SDK</td><td>13.12.0</td><td>This release adds support for Secret Engines and Managed Secrets in the SDKs.</td></tr><tr><td>2025-04-07</td><td>CLI</td><td>47.8.0</td><td>SSH (Customer Managed Key) resources now support Identity Aliases in addition to the existing support for leased credentials. Identity Aliases allow a different SSH username to be used for different users connecting to the same resource with the same SSH key. This new configuration is supported across the Admin UI, CLI, SDKs, and Terraform.</td></tr><tr><td>2025-04-07</td><td>Control Plane</td><td>101.81.0</td><td>SSH (Customer Managed Key) resources now support Identity Aliases in addition to the existing support for leased credentials. Identity Aliases allow a different SSH username to be used for different users connecting to the same resource with the same SSH key. This new configuration is supported across the Admin UI, CLI, SDKs, and Terraform.</td></tr><tr><td>2025-04-07</td><td>Terraform Provider</td><td>13.11.0</td><td>SSH (Customer Managed Key) resources now support Identity Aliases in addition to the existing support for leased credentials. Identity Aliases allow a different SSH username to be used for different users connecting to the same resource with the same SSH key. This new configuration is supported across the Admin UI, CLI, SDKs, and Terraform.</td></tr><tr><td>2025-04-07</td><td>Python SDK</td><td>13.11.0</td><td>SSH (Customer Managed Key) resources now support Identity Aliases in addition to the existing support for leased credentials. Identity Aliases allow a different SSH username to be used for different users connecting to the same resource with the same SSH key. This new configuration is supported across the Admin UI, CLI, SDKs, and Terraform.</td></tr><tr><td>2025-04-07</td><td>Ruby SDK</td><td>13.11.0</td><td>SSH (Customer Managed Key) resources now support Identity Aliases in addition to the existing support for leased credentials. Identity Aliases allow a different SSH username to be used for different users connecting to the same resource with the same SSH key. This new configuration is supported across the Admin UI, CLI, SDKs, and Terraform.</td></tr><tr><td>2025-04-07</td><td>Go SDK</td><td>13.11.0</td><td>SSH (Customer Managed Key) resources now support Identity Aliases in addition to the existing support for leased credentials. Identity Aliases allow a different SSH username to be used for different users connecting to the same resource with the same SSH key. This new configuration is supported across the Admin UI, CLI, SDKs, and Terraform.</td></tr><tr><td>2025-04-07</td><td>Control Plane</td><td>101.78.0</td><td>This release updates the access workflow quota limit to be no longer capped at 100.</td></tr><tr><td>2025-04-07</td><td>Control Plane</td><td>101.76.0</td><td>This release adds support for the Amazon OpenSearch/Elasticsearch (IAM) datasource type, allowing Opensearch/Elasticsearch to be set up using IAM.</td></tr><tr><td>2025-04-07</td><td>CLI</td><td>47.7.0</td><td>This release adds support for the Amazon OpenSearch/Elasticsearch (IAM) datasource type, allowing Opensearch/Elasticsearch to be set up using IAM.</td></tr><tr><td>2025-04-07</td><td>Python SDK</td><td>13.10.0</td><td>This release adds support for the Amazon OpenSearch/Elasticsearch (IAM) datasource type, allowing Opensearch/Elasticsearch to be set up using IAM.</td></tr><tr><td>2025-04-07</td><td>Go SDK</td><td>13.10.0</td><td>This release adds support for the Amazon OpenSearch/Elasticsearch (IAM) datasource type, allowing Opensearch/Elasticsearch to be set up using IAM.</td></tr><tr><td>2025-04-07</td><td>Ruby SDK</td><td>13.10.0</td><td>This release adds support for the Amazon OpenSearch/Elasticsearch (IAM) datasource type, allowing Opensearch/Elasticsearch to be set up using IAM.</td></tr><tr><td>2025-04-07</td><td>CLI</td><td>47.6.0</td><td>Add support for Redis Cluster</td></tr><tr><td>2025-04-07</td><td>Control Plane</td><td>101.75.0</td><td>Add support for Redis Cluster</td></tr><tr><td>2025-04-07</td><td>Go SDK</td><td>13.9.0</td><td>Add support for Redis Cluster</td></tr><tr><td>2025-04-04</td><td>Terraform Provider</td><td>13.8.0</td><td>This release allows usernames and passwords for the Vertica resource type to be vaulted with third-party secret stores for our Terraform provider.</td></tr><tr><td>2025-04-04</td><td>CLI</td><td>47.4.0</td><td>This release updates the CLI with an interactive login for <code>sdm login</code> that prompts users to select an app domain. The default app domain is <code>app.strongdm.com</code>. If <code>SDM_APP_DOMAIN</code> is set in the environment, it will take precedence instead and no prompt will be shown.</td></tr><tr><td>2025-04-03</td><td>Control Plane</td><td>101.60.0</td><td>This release speeds up load times between page and tab navigation in the Admin UI.</td></tr><tr><td>2025-04-02</td><td>Control Plane</td><td>101.58.0</td><td>This release makes multistep approval workflows generally available. You can now create approval workflows with multiple approval steps. There are new settings that allow you to skip an approval step after it's been idle for a period of time, or specify whether any or all approvers need to approve that step. In addition, this release adds the new CLI command <code>sdm admin approval-workflows-multistep</code>, which takes JSON configuration for a whole approval workflow, including approval steps and approvers. Users can also query and list information about approval workflows through this CLI command. Lastly, this release deprecates the following CLI commands, which will continue to work for existing customers, but without the new multistep approval workflow functionality: <code>sdm admin approval workflows</code>, <code>sdm admin approval-workflow-steps</code>, and <code>sdm admin approval-workflow-approvers</code>.</td></tr><tr><td>2025-04-02</td><td>CLI</td><td>47.3.0</td><td>This release makes multistep approval workflows generally available. You can now create approval workflows with multiple approval steps. There are new settings that allow you to skip an approval step after it's been idle for a period of time, or specify whether any or all approvers need to approve that step. In addition, this release adds the new CLI command <code>sdm admin approval-workflows-multistep</code>, which takes JSON configuration for a whole approval workflow, including approval steps and approvers. Users can also query and list information about approval workflows through this CLI command. Lastly, this release deprecates the following CLI commands, which will continue to work for existing customers, but without the new multistep approval workflow functionality: <code>sdm admin approval workflows</code>, <code>sdm admin approval-workflow-steps</code>, and <code>sdm admin approval-workflow-approvers</code>.</td></tr><tr><td>2025-03-31</td><td>Desktop Application</td><td>22.18.0</td><td>This release changes what is displayed in the desktop menu app when logging into or logging out of StrongDM. Now, the "Open app.strongdm.com" option will no longer appear in the menu when logged out. When logged in, the "Open app.strongdm.com" menu option will display as "Open [the control plane domain you are authenticated with]".</td></tr><tr><td>2025-03-31</td><td>Terraform Provider</td><td>13.6.0</td><td>The SDKs now send requests to app.strongdm.com by default, rather than api.strongdm.com. The previous address will continue to be supported indefinitely.</td></tr><tr><td>2025-03-31</td><td>Python SDK</td><td>13.6.0</td><td>The SDKs now send requests to app.strongdm.com by default, rather than api.strongdm.com. The previous address will continue to be supported indefinitely.</td></tr><tr><td>2025-03-31</td><td>Ruby SDK</td><td>13.6.0</td><td>The SDKs now send requests to app.strongdm.com by default, rather than api.strongdm.com. The previous address will continue to be supported indefinitely.</td></tr><tr><td>2025-03-31</td><td>Go SDK</td><td>13.6.0</td><td>The SDKs now send requests to app.strongdm.com by default, rather than api.strongdm.com. The previous address will continue to be supported indefinitely.</td></tr><tr><td>2025-03-28</td><td>Control Plane</td><td>101.39.0</td><td>This release adds support for the Vertica database in the SDKs.</td></tr><tr><td>2025-03-28</td><td>CLI</td><td>46.99.0</td><td>This release adds support for the Vertica database in the SDKs.</td></tr><tr><td>2025-03-28</td><td>Terraform Provider</td><td>13.5.0</td><td>This release adds support for the Vertica database in the SDKs.</td></tr><tr><td>2025-03-28</td><td>Ruby SDK</td><td>13.5.0</td><td>This release adds support for the Vertica database in the SDKs.</td></tr><tr><td>2025-03-28</td><td>Python SDK</td><td>13.5.0</td><td>This release adds support for the Vertica database in the SDKs.</td></tr><tr><td>2025-03-28</td><td>Go SDK</td><td>13.5.0</td><td>This release adds support for the Vertica database in the SDKs.</td></tr><tr><td>2025-03-27</td><td>CLI</td><td>46.98.0</td><td>This release deprecates the <code>sdm install --domain</code> CLI command. Instead, use <code>--app-domain</code> and pass the full domain name of the control plane including the <code>app.</code> (for example, <code>sdm install --app-domain app.eu.strongdm.com</code>). The <code>--domain</code> flag will continue to work as-is indefinitely.</td></tr><tr><td>2025-03-21</td><td>Control Plane</td><td>101.17.0</td><td>This release mitigates certain instances of hung healthcheck diagnostics in the Admin UI.</td></tr><tr><td>2025-03-21</td><td>CLI</td><td>46.92.0</td><td>This release removes <code>sdm admin managedsecrets validate</code> and <code>sdm admin managedsecrets validate</code> from the CLI. Please use <code>sdm managedsecrets validate</code> and <code>sdm managedsecrets validate</code> with relevant permission policy instead.</td></tr><tr><td>2025-03-20</td><td>Control Plane</td><td>101.13.0</td><td>This release makes proxy clusters generally available as a new deployment option.</td></tr><tr><td>2025-03-19</td><td>Control Plane</td><td>101.9.0</td><td>This release adds support for secret engines to enterprise customers. All enterprise customers can now create secret engines and managed secrets.</td></tr><tr><td>2025-03-14</td><td>Control Plane</td><td>100.91.0</td><td>This release updates the Relay and Gateway Resources tab in the Admin UI to have search and filtering capabilities. Users can now search by resource name, type filter, status filter, and tags filter.</td></tr><tr><td>2025-03-14</td><td>Control Plane</td><td>100.89.0</td><td>This release adds a workflow setting to the Admin UI to specify the number of requests a user can make to a resource.</td></tr><tr><td>2025-03-14</td><td>Desktop Application</td><td>22.15.0</td><td>This release enables users with multiple control planes to select which control plane they want to connect to from the desktop app.</td></tr><tr><td>2025-03-14</td><td>Control Plane</td><td>100.86.0</td><td>This release introduces an exponential backoff in case of automatic rotation failures for Active Directory secret engines. This will reduce the number of errors that might be observed for misconfigured Active Directory accounts. The interval for retries in case of failures will be increased with each failure until it reaches <code>max_backoff_duration</code>. After that retries happen every <code>max_backoff_duration</code>. The default value for <code>max_backoff_duration</code> is 1 day (24 hours). <code>max_backoff_duration</code> can be set using the <code>--max-backoff-duration</code> flag when updating a secret engine (<code>sdm admin secretengines update active_directory &#x26;lt;SECRET_ENGINE_ID&#x26;gt;</code>) or creating a secret engine (<code>sdm admin secretengines create active_directory</code>).</td></tr><tr><td>2025-03-14</td><td>CLI</td><td>46.87.0</td><td>This release introduces an exponential backoff in case of automatic rotation failures for Active Directory secret engines. This will reduce the number of errors that might be observed for misconfigured Active Directory accounts. The interval for retries in case of failures will be increased with each failure until it reaches <code>max_backoff_duration</code>. After that retries happen every <code>max_backoff_duration</code>. The default value for <code>max_backoff_duration</code> is 1 day (24 hours). <code>max_backoff_duration</code> can be set using the <code>--max-backoff-duration</code> flag when updating a secret engine (<code>sdm admin secretengines update active_directory &#x26;lt;SECRET_ENGINE_ID&#x26;gt;</code>) or creating a secret engine (<code>sdm admin secretengines create active_directory</code>).</td></tr><tr><td>2025-03-11</td><td>Control Plane</td><td>100.80.0</td><td>This release adds the new permission level Database Operator.</td></tr><tr><td>2025-03-11</td><td>Terraform Provider</td><td>13.3.0</td><td>This release adds the new permission level Database Operator.</td></tr><tr><td>2025-03-11</td><td>Ruby SDK</td><td>13.3.0</td><td>This release adds the new permission level Database Operator.</td></tr><tr><td>2025-03-11</td><td>Go SDK</td><td>13.3.0</td><td>This release adds the new permission level Database Operator.</td></tr><tr><td>2025-03-11</td><td>Python SDK</td><td>13.3.0</td><td>This release adds the new permission level Database Operator.</td></tr><tr><td>2025-03-10</td><td>CLI</td><td>46.84.0</td><td>This release adds support to the <code>sdm connect</code> CLI command, allowing it to accept either a resource name or a resource ID as the argument.</td></tr><tr><td>2025-03-10</td><td>Control Plane</td><td>100.75.0</td><td>This release adds support to the <code>sdm connect</code> CLI command, allowing it to accept either a resource name or a resource ID as the argument.</td></tr><tr><td>2025-03-10</td><td>Control Plane</td><td>100.71.0</td><td>This release fixes an issue with the <code>sdm admin users grant-temporary --template-role</code> CLI command, in which it would not grant access to resources on that role.</td></tr><tr><td>2025-03-08</td><td>CLI</td><td>46.81.0</td><td>This release fixes an issue that could cause unexpected disconnects from RDP (Certificate Based) resources with certain combinations of Windows client and server versions.</td></tr><tr><td>2025-03-06</td><td>CLI</td><td>46.78.0</td><td>This release fixes a healthcheck bug for Amazon EKS resources where the wrong namespace was used during the healthcheck when Identity Sets were enabled.</td></tr><tr><td>2025-03-06</td><td>CLI</td><td>46.77.0</td><td>This release adds the Kubernetes (Pod Identity) cluster resource type, which supports connection to Kubernetes clusters that have a node (relay or gateway) running inside them, without ever giving StrongDM credentials to the cluster.</td></tr><tr><td>2025-03-06</td><td>Terraform Provider</td><td>13.2.0</td><td>This release adds the Kubernetes (Pod Identity) cluster resource type, which supports connection to Kubernetes clusters that have a node (relay or gateway) running inside them, without ever giving StrongDM credentials to the cluster.</td></tr><tr><td>2025-03-06</td><td>Control Plane</td><td>100.63.0</td><td>This release adds the Kubernetes (Pod Identity) cluster resource type, which supports connection to Kubernetes clusters that have a node (relay or gateway) running inside them, without ever giving StrongDM credentials to the cluster.</td></tr><tr><td>2025-03-06</td><td>Python SDK</td><td>13.2.0</td><td>This release adds the Kubernetes (Pod Identity) cluster resource type, which supports connection to Kubernetes clusters that have a node (relay or gateway) running inside them, without ever giving StrongDM credentials to the cluster.</td></tr><tr><td>2025-03-06</td><td>Ruby SDK</td><td>13.2.0</td><td>This release adds the Kubernetes (Pod Identity) cluster resource type, which supports connection to Kubernetes clusters that have a node (relay or gateway) running inside them, without ever giving StrongDM credentials to the cluster.</td></tr><tr><td>2025-03-06</td><td>Go SDK</td><td>13.2.0</td><td>This release adds the Kubernetes (Pod Identity) cluster resource type, which supports connection to Kubernetes clusters that have a node (relay or gateway) running inside them, without ever giving StrongDM credentials to the cluster.</td></tr><tr><td>2025-03-04</td><td>CLI</td><td>46.74.0</td><td>This release updates the <code>sdm replay rdp</code> CLI command to include improved help and usage information, updates <code>sdm replay rdp</code> to support rendering RDP sessions older than one week, and updates <code>sdm replay rdp</code> to be able to be used to render RDP sessions from local relay log files encrypted with public key encryption (via the <code>--key</code> option).</td></tr><tr><td>2025-03-03</td><td>Control Plane</td><td>100.44.0</td><td>This releases changes the MS SQL Kerberos SPN field to be a non-credential type. This only changes behavior when using secret stores with MS SQL Kerberos resources. Previously, a secret path needed to be specified for the SPN field when using secret stores. Now the field is always a plaintext string.</td></tr><tr><td>2025-03-03</td><td>Terraform Provider</td><td>13.0.0</td><td>This releases changes the MS SQL Kerberos SPN field to be a non-credential type. This only changes behavior when using secret stores with MS SQL Kerberos resources. Previously, a secret path needed to be specified for the SPN field when using secret stores. Now the field is always a plaintext string.</td></tr><tr><td>2025-03-03</td><td>Go SDK</td><td>13.0.0</td><td>This releases changes the MS SQL Kerberos SPN field to be a non-credential type. This only changes behavior when using secret stores with MS SQL Kerberos resources. Previously, a secret path needed to be specified for the SPN field when using secret stores. Now the field is always a plaintext string.</td></tr><tr><td>2025-03-03</td><td>Ruby SDK</td><td>13.0.0</td><td>This releases changes the MS SQL Kerberos SPN field to be a non-credential type. This only changes behavior when using secret stores with MS SQL Kerberos resources. Previously, a secret path needed to be specified for the SPN field when using secret stores. Now the field is always a plaintext string.</td></tr><tr><td>2025-03-03</td><td>Python SDK</td><td>13.0.0</td><td>This releases changes the MS SQL Kerberos SPN field to be a non-credential type. This only changes behavior when using secret stores with MS SQL Kerberos resources. Previously, a secret path needed to be specified for the SPN field when using secret stores. Now the field is always a plaintext string.</td></tr><tr><td>2025-03-03</td><td>Control Plane</td><td>100.43.0</td><td>This release improves the Cluster Discovery tab in the Admin UI to show a more meaningful message when nothing has been discovered yet.</td></tr><tr><td>2025-02-28</td><td>Control Plane</td><td>100.39.0</td><td>This release fixes an issue that caused requesting access to a resource via fixed duration to display "Requested for 0 days" in the access details column.</td></tr><tr><td>2025-02-26</td><td>CLI</td><td>46.69.0</td><td>This release fixes an issue for Oracle, where entering a raw IP address as the hostname causes the connection to fail. Additionally, this release fixes a connectivity issue for Oracle 19 in OCI and any other Oracle servers using the same connection format from odbc6.jar (version8i).</td></tr><tr><td>2025-02-20</td><td>Control Plane</td><td>100.16.0</td><td>This release updates policies so that <code>StrongDM::ManagedSecret::Action::&#x26;#34;read&#x26;#34;</code> is now granted implicitly as part of <code>StrongDM::ManagedSecret::Action::&#x26;#34;retrieve&#x26;#34;</code>, <code>StrongDM::ManagedSecret::Action::&#x26;#34;rotate&#x26;#34;</code>, and <code>StrongDM::ManagedSecret::Action::&#x26;#34;validate&#x26;#34;</code>. Now users granted those "broader" permissions can also list secrets they can take action upon.</td></tr><tr><td>2025-02-19</td><td>Control Plane</td><td>100.12.0</td><td>This release updates the way users are routed to certain Admin UI pages upon login. Users with the User permission level on login will be routed to the Download &#x26; Install page. Users with the Database Admin permission level on login will be routed to the Datasources page. Users with the Admin permission level who have expired Enterprise accounts will see an Enterprise purchase banner at the top of the page for pages that are Enterprise-only.</td></tr><tr><td>2025-02-19</td><td>Control Plane</td><td>100.10.0</td><td>This release updates the Policy Logs page of the Admin with a new design and filtering capability. Users can now use dropdown filters and search input to reduce the amount of logs displayed based on the requested filters.</td></tr><tr><td>2025-02-14</td><td>CLI</td><td>46.64.0</td><td>This release addresses an issue where under periods of heavy load, nodes may potentially run out of memory if remote logging to StrongDM is enabled and query and replay data is being generated faster than it can be logged to StrongDM. Nodes are now limited to consuming no more than about 50 percent of system memory for buffering remote logs, throttling traffic when this limit is reached. While it should not be necessary to do so, these default limits may be overridden via <code>SDM_RELAY_LOG_REMOTE_BUFFER_BYTES</code> and <code>SDM_RELAY_LOG_REMOTE_BUFFER_RETRY_BYTES</code> environment variables.</td></tr><tr><td>2025-02-12</td><td>CLI</td><td>46.62.0</td><td>This release updates the SDKs to support the new AccessRule field for account grants.</td></tr><tr><td>2025-02-12</td><td>Control Plane</td><td>100.1.0</td><td>This release updates the SDKs to support the new AccessRule field for account grants.</td></tr><tr><td>2025-02-12</td><td>Python SDK</td><td>12.10.0</td><td>This release updates the SDKs to support the new AccessRule field for account grants.</td></tr><tr><td>2025-02-12</td><td>Go SDK</td><td>12.10.0</td><td>This release updates the SDKs to support the new AccessRule field for account grants.</td></tr><tr><td>2025-02-12</td><td>Ruby SDK</td><td>12.10.0</td><td>This release updates the SDKs to support the new AccessRule field for account grants.</td></tr><tr><td>2025-02-11</td><td>Control Plane</td><td>99.95.0</td><td><ul><li>Fix dropdown behavior.</li></ul></td></tr><tr><td>2025-02-10</td><td>CLI</td><td>46.60.0</td><td>This release adds support to RDP resources for connecting to Windows 11 and Windows Server 2025 RDP servers with Network Level Authentication (NLA) enabled. Previously, RDP resources required NLA to be disabled on these newer Windows versions.</td></tr><tr><td>2025-02-10</td><td>CLI</td><td>46.59.0</td><td>This release fixes an issue where RDP sessions to some Windows target server versions, including Windows 10, may fail to render into video fields. This release also fixes an issue where RDP sessions from Windows 11 24H2 clients to some Windows target server versions, including Windows 10 and 11, may display incorrectly, with heavy pixelation of the screen.</td></tr><tr><td>2025-02-07</td><td>Control Plane</td><td>99.89.0</td><td>This release improves resource selection in the temporary access modal to allow better search results.</td></tr><tr><td>2025-02-06</td><td>Control Plane</td><td>99.85.0</td><td>Fixed error when accepting user invitations.</td></tr><tr><td>2025-02-06</td><td>Control Plane</td><td>99.78.0</td><td>Fixed routing issue when trying to log in while already authenticated.</td></tr><tr><td>2025-02-06</td><td>Control Plane</td><td>99.77.0</td><td>This release updates the temporary access table to no longer increment the total count by two when adding a new temporary grant to a user.</td></tr><tr><td>2025-02-05</td><td>Control Plane</td><td>99.74.0</td><td>This release fixes an issue where gateways device details text would overflow into other text.</td></tr><tr><td>2025-02-04</td><td>Control Plane</td><td>99.62.0</td><td>This release fixes an issue where a newly created role wasn't immediately showing up in the roles table in the Admin UI. It also fixes an issue where the "reason" text field in the access request modal did not capture the first character being typed into it.</td></tr><tr><td>2025-02-03</td><td>Control Plane</td><td>99.60.0</td><td>This release ensures that Role IDs no longer show up in the search box of the attach role selector on the access workflow form.</td></tr><tr><td>2025-01-31</td><td>Terraform Provider</td><td>12.9.1</td><td>This release updates the Terraform provider docs to include max duration and fixed duration settings for individual access workflows.</td></tr><tr><td>2025-01-30</td><td>CLI</td><td>46.43.0</td><td>This release fixes an issue with RDP session video rendering (both in the Admin UI and the CLI) that could potentially result in artifacts in the rendered video due to a rare mis-parsing of bitmap updates in the RDP session data.</td></tr><tr><td>2025-01-29</td><td>CLI</td><td>46.41.0</td><td>This release provides the capability for users to append an <code>-e</code> flag to their <code>sdm status</code> CLI command. This will show privilege levels (if any) for any clusters they currently have privileges for.</td></tr><tr><td>2025-01-29</td><td>Control Plane</td><td>99.38.0</td><td>This release provides the capability for users to append an <code>-e</code> flag to their <code>sdm status</code> CLI command. This will show privilege levels (if any) for any clusters they currently have privileges for.</td></tr><tr><td>2025-01-29</td><td>Control Plane</td><td>99.33.0</td><td>This release adds a new logs page to the Admin UI for Credential Management logs.</td></tr><tr><td>2025-01-28</td><td>CLI</td><td>46.40.0</td><td>Relays previously output the following non-structured log line every 2 minutes on <code>stderr</code>: <code>link count: %d, stream count: %d, egress count: %d</code>. This log will now appear in the following structured format on <code>stdout</code>, bringing it in compliance with all other log lines: <code>time=&#x26;#34;2025-01-28T10:15:56-08:00&#x26;#34; level=info msg=&#x26;#34;link monitor&#x26;#34; linkCount=1 streamCount=0 egressCount=0</code>.</td></tr><tr><td>2025-01-28</td><td>CLI</td><td>46.39.0</td><td>This release adds the <code>PrivilegeGroups</code> field to <code>sharedkernel.Capture</code> model, allowing these to be auditable via <code>sdm audit k8s</code> and in query logs. These fields are populated by any groups granted via privileges for a given Kubernetes operation.</td></tr><tr><td>2025-01-28</td><td>Terraform Provider</td><td>12.9.0</td><td>This release adds the <code>PrivilegeGroups</code> field to <code>sharedkernel.Capture</code> model, allowing these to be auditable via <code>sdm audit k8s</code> and in query logs. These fields are populated by any groups granted via privileges for a given Kubernetes operation.</td></tr><tr><td>2025-01-28</td><td>Python SDK</td><td>12.9.0</td><td>This release adds the <code>PrivilegeGroups</code> field to <code>sharedkernel.Capture</code> model, allowing these to be auditable via <code>sdm audit k8s</code> and in query logs. These fields are populated by any groups granted via privileges for a given Kubernetes operation.</td></tr><tr><td>2025-01-28</td><td>Ruby SDK</td><td>12.9.0</td><td>This release adds the <code>PrivilegeGroups</code> field to <code>sharedkernel.Capture</code> model, allowing these to be auditable via <code>sdm audit k8s</code> and in query logs. These fields are populated by any groups granted via privileges for a given Kubernetes operation.</td></tr><tr><td>2025-01-28</td><td>Go SDK</td><td>12.9.0</td><td>This release adds the <code>PrivilegeGroups</code> field to <code>sharedkernel.Capture</code> model, allowing these to be auditable via <code>sdm audit k8s</code> and in query logs. These fields are populated by any groups granted via privileges for a given Kubernetes operation.</td></tr><tr><td>2025-01-27</td><td>CLI</td><td>46.38.0</td><td>This release adds the <code>sdm access request &#x26;lt;REQUEST_ID&#x26;gt;</code> CLI command that displays a summary of the request and approvals.</td></tr><tr><td>2025-01-27</td><td>CLI</td><td>46.37.0</td><td>This release adds support for IAM authentication with Aurora MySQL.</td></tr><tr><td>2025-01-27</td><td>Control Plane</td><td>99.24.0</td><td>This release fixes an issue where <code>sdm access requests --filter=&#x26;#34;request:&#x26;lt;RESOURCE_NAME&#x26;gt;&#x26;#34;&#x26;#34;</code> would not return some access requests when there were matching requests.</td></tr><tr><td>2025-01-27</td><td>Terraform Provider</td><td>12.8.0</td><td>This release adds support for IAM authentication with Aurora MySQL.</td></tr><tr><td>2025-01-27</td><td>Control Plane</td><td>99.22.0</td><td>This release adds support for IAM authentication with Aurora MySQL.</td></tr><tr><td>2025-01-27</td><td>Go SDK</td><td>12.8.0</td><td>This release adds support for IAM authentication with Aurora MySQL.</td></tr><tr><td>2025-01-27</td><td>Ruby SDK</td><td>12.8.0</td><td>This release adds support for IAM authentication with Aurora MySQL.</td></tr><tr><td>2025-01-27</td><td>Python SDK</td><td>12.8.0</td><td>This release adds support for IAM authentication with Aurora MySQL.</td></tr><tr><td>2025-01-24</td><td>Control Plane</td><td>99.12.0</td><td>This release makes the Windows x32 version no longer available for download on the Admin UI Download &#x26; Install page.</td></tr><tr><td>2025-01-24</td><td>Control Plane</td><td>99.10.0</td><td>This release fixes an issue where resources would not appear for an access request in reports.</td></tr><tr><td>2025-01-23</td><td>Control Plane</td><td>99.4.0</td><td>This release updates the Admin UI with new table ordering that allows you to sort by name on Gateway and Relay pages.</td></tr><tr><td>2025-01-22</td><td>CLI</td><td>46.32.0</td><td>This release adds support for DocumentDB with IAM authentication.</td></tr><tr><td>2025-01-22</td><td>Terraform Provider</td><td>12.5.0</td><td>This release adds support for DocumentDB with IAM authentication.</td></tr><tr><td>2025-01-22</td><td>Control Plane</td><td>98.87.0</td><td>This release adds support for DocumentDB with IAM authentication.</td></tr><tr><td>2025-01-22</td><td>Python SDK</td><td>12.5.0</td><td>This release adds support for DocumentDB with IAM authentication.</td></tr><tr><td>2025-01-22</td><td>Go SDK</td><td>12.5.0</td><td>This release adds support for DocumentDB with IAM authentication.</td></tr><tr><td>2025-01-22</td><td>Ruby SDK</td><td>12.5.0</td><td>This release adds support for DocumentDB with IAM authentication.</td></tr><tr><td>2025-01-21</td><td>Control Plane</td><td>98.85.0</td><td>This release adds a loading indicator to the policy logs details panel of the Admin UI.</td></tr><tr><td>2025-01-21</td><td>CLI</td><td>46.31.0</td><td>This release addresses the following third party CVEs: CVE-2024-45336,CVE-2024-45341</td></tr><tr><td>2025-01-21</td><td>Control Plane</td><td>98.80.0</td><td>This release addresses the following third party CVEs: CVE-2024-45336,CVE-2024-45341</td></tr><tr><td>2025-01-17</td><td>Control Plane</td><td>98.74.0</td><td>This release fixes a bug where 31 days was the maximum duration access could be requested even if the organization or workflow allowed for more.</td></tr><tr><td>2025-01-17</td><td>Control Plane</td><td>98.71.0</td><td>This release updates the modal for granting temporary access to be broken up into multiple steps. The step for selecting resources has been changed from checkboxes to a combobox/search input.</td></tr><tr><td>2025-01-17</td><td>Desktop Application</td><td>22.4.0</td><td>This release makes ClickHouse available in the CLI.</td></tr><tr><td>2025-01-17</td><td>Java SDK</td><td>12.4.0</td><td>This release adds the ClickHouse resource type.</td></tr><tr><td>2025-01-17</td><td>CLI</td><td>46.26.0</td><td>This release adds the ClickHouse resource type.</td></tr><tr><td>2025-01-17</td><td>Python SDK</td><td>12.4.0</td><td>This release adds the ClickHouse resource type.</td></tr><tr><td>2025-01-17</td><td>Ruby SDK</td><td>12.4.0</td><td>This release adds the ClickHouse resource type.</td></tr><tr><td>2025-01-17</td><td>Go SDK</td><td>12.4.0</td><td>This release adds the ClickHouse resource type.</td></tr><tr><td>2025-01-16</td><td>Control Plane</td><td>98.57.0</td><td>This release adds the DynamoDB (IAM) resource type.</td></tr><tr><td>2025-01-14</td><td>Java SDK</td><td>12.2.0</td><td>This release makes the Google Cloud Platform Workforce Identity Federation resource type generally available.</td></tr><tr><td>2025-01-14</td><td>CLI</td><td>46.19.0</td><td>This release makes the Google Cloud Platform Workforce Identity Federation resource type generally available.</td></tr><tr><td>2025-01-14</td><td>Terraform Provider</td><td>12.2.0</td><td>This release makes the Google Cloud Platform Workforce Identity Federation resource type generally available.</td></tr><tr><td>2025-01-14</td><td>Control Plane</td><td>98.45.0</td><td>This release makes the Google Cloud Platform Workforce Identity Federation resource type generally available.</td></tr><tr><td>2025-01-14</td><td>Python SDK</td><td>12.2.0</td><td>This release makes the Google Cloud Platform Workforce Identity Federation resource type generally available.</td></tr><tr><td>2025-01-14</td><td>Go SDK</td><td>12.2.0</td><td>This release makes the Google Cloud Platform Workforce Identity Federation resource type generally available.</td></tr><tr><td>2025-01-14</td><td>Ruby SDK</td><td>12.2.0</td><td>This release makes the Google Cloud Platform Workforce Identity Federation resource type generally available.</td></tr><tr><td>2025-01-13</td><td>Control Plane</td><td>98.30.0</td><td>This release updates the Roles page of the Admin UI to have table ordering on the Roles column.</td></tr><tr><td>2025-01-10</td><td>CLI</td><td>46.14.0</td><td>This release adds the CLI command <code>sdm admin secretengines rotate</code> for rotating a secret engine's password used for connecting to Active Directory (currently only the <code>active_directory</code> secret engine type supports this). Running the command will update <code>Bindpass</code> in the Active Directory and store a new password inside the secret engine's configuration stored inside the secret store.</td></tr><tr><td>2025-01-10</td><td>Control Plane</td><td>98.23.0</td><td>This release adds the CLI command <code>sdm admin secretengines rotate</code> for rotating a secret engine's password used for connecting to Active Directory (currently only the <code>active_directory</code> secret engine type supports this). Running the command will update <code>Bindpass</code> in the Active Directory and store a new password inside the secret engine's configuration stored inside the secret store.</td></tr><tr><td>2025-01-08</td><td>CLI</td><td>46.11.0</td><td>This release adds the ability to set workflow settings at the workflow level via the StrongDM SDKs and CLI.</td></tr><tr><td>2025-01-08</td><td>Terraform Provider</td><td>11.23.0</td><td>This release adds the ability to set workflow settings at the workflow level via the StrongDM SDKs and CLI.</td></tr><tr><td>2025-01-08</td><td>Java SDK</td><td>11.23.0</td><td>This release adds the ability to set workflow settings at the workflow level via the StrongDM SDKs and CLI.</td></tr><tr><td>2025-01-08</td><td>Control Plane</td><td>98.8.0</td><td>This release adds the ability to set workflow settings at the workflow level via the StrongDM SDKs and CLI.</td></tr><tr><td>2025-01-08</td><td>Python SDK</td><td>11.23.0</td><td>This release adds the ability to set workflow settings at the workflow level via the StrongDM SDKs and CLI.</td></tr><tr><td>2025-01-08</td><td>Ruby SDK</td><td>11.23.0</td><td>This release adds the ability to set workflow settings at the workflow level via the StrongDM SDKs and CLI.</td></tr><tr><td>2025-01-08</td><td>Go SDK</td><td>11.23.0</td><td>This release adds the ability to set workflow settings at the workflow level via the StrongDM SDKs and CLI.</td></tr><tr><td>2025-01-08</td><td>Control Plane</td><td>98.6.0</td><td>This release updates the Jira Connect button on the Admin UI Integrations page to link to the EU version of the Jira plugin for the EU control plane.</td></tr><tr><td>2025-01-04</td><td>Control Plane</td><td>97.91.0</td><td>This release enhances the integration for Slack's display of access requests in the app by adding a summary of the approval steps and approvers.</td></tr><tr><td>2025-01-02</td><td>Control Plane</td><td>97.82.0</td><td>This release includes minor updates to the integrations with Microsoft Teams and Jira to support split requested and result duration of access requests.</td></tr><tr><td>2024-12-20</td><td>Control Plane</td><td>97.69.0</td><td>This release updates the Jira integration card in the Admin UI to link to the control plane-specific Jira app.</td></tr><tr><td>2024-12-19</td><td>Control Plane</td><td>97.63.0</td><td>This release allows admins to adjust settings of a specific access workflow.</td></tr><tr><td>2024-12-19</td><td>Control Plane</td><td>97.59.0</td><td>This release changes all Admin UI resource pages to allow columns to be ordered by name and type.</td></tr><tr><td>2024-12-18</td><td>Control Plane</td><td>97.52.0</td><td>This release updates credential rotation so that rotating a credential now updates the expiration date, in turn preventing a validation expiration date from showing an "expired" alert.</td></tr><tr><td>2024-12-18</td><td>CLI</td><td>46.3.0</td><td>This release updates the CLI command <code>sdm audit access-requests</code> to include the approval flow ID.</td></tr><tr><td>2024-12-17</td><td>Control Plane</td><td>97.45.0</td><td>This release fixes an issue related to Snowflake resources created via the API/CLI and Terraform. Currently, when not set, the "Port" argument defaults to 0, resulting in the Snowflake driver constructing a request that causes Snowflake to return with an unexpected error. This fix ensures that the default port of 443 is used when not set.</td></tr><tr><td>2024-12-17</td><td>CLI</td><td>46.2.0</td><td>This release makes the <code>--name</code> parameter visible in the CLI help for the <code>sdm aws</code> and <code>sdm az</code> CLI commands. This parameter was already documented but hidden in the CLI help.</td></tr><tr><td>2024-12-13</td><td>Control Plane</td><td>97.36.0</td><td><p>This change makes a fix to the Admin UI that allows known healthcheck information to be displayed on the Datasources details page as it comes in rather than waiting for all nodes to report healthcheck information. Prior to this change, if one or more nodes were in a broken state where they were not able to report healthcheck status, the displayed status for all nodes would have been Checking.</p><p>Now, the healthy nodes' healthcheck status is able to be reported as it comes in and only unhealthy nodes stay in a Checking state.</p></td></tr><tr><td>2024-12-12</td><td>Control Plane</td><td>97.28.0</td><td>This release fixes an issue where failing to retrieve a credential on the <strong>Credentials</strong> page in the Admin UI could only be resolved by first refreshing the page. Now there is a retry button and the credential is always retrieval is always attempted when selecting the retrieve menu option.</td></tr><tr><td>2024-12-11</td><td>CLI</td><td>45.93.0</td><td>This release adds a new filter for filtering queries through the <code>sdm audit</code> CLI command or through the Queries vertical in the SDK. The <code>authzAction</code> filter can filter queries by authorization request action (such as <code>StrongDM::Action::&#x26;#34;connect&#x26;#34;</code> or <code>SQL::Action::&#x26;#34;drop&#x26;#34;</code>). This filter may include wildcards, for example <code>*sql*drop*</code>. This filter does not match on queries that were not associated with a policy authorization.</td></tr><tr><td>2024-12-11</td><td>Control Plane</td><td>97.22.0</td><td>This release adds a new filter for filtering queries through the <code>sdm audit</code> CLI command or through the Queries vertical in the SDK. The <code>authzAction</code> filter can filter queries by authorization request action (such as <code>StrongDM::Action::&#x26;#34;connect&#x26;#34;</code> or <code>SQL::Action::&#x26;#34;drop&#x26;#34;</code>). This filter may include wildcards, for example <code>*sql*drop*</code>. This filter does not match on queries that were not associated with a policy authorization.</td></tr><tr><td>2024-12-10</td><td>Control Plane</td><td>97.15.0</td><td>This release updates the <strong>Integrations</strong> page in the Admin UI to now link to the EU Microsoft Teams listing for users on the EU control plane.</td></tr><tr><td>2024-12-09</td><td>CLI</td><td>45.90.0</td><td>This release fixes an issue introduced in version 45.80.0 of the CLI that could cause <code>sdm aws terraform</code> commands to fail with a "tls: failed to verify certificate" error.</td></tr><tr><td>2024-12-09</td><td>Control Plane</td><td>97.10.0</td><td>This release enhances the Users page in the Admin UI to make the <strong>Name</strong>, <strong>Email</strong>, and <strong>Permission Level</strong> columns sortable.</td></tr><tr><td>2024-12-05</td><td>Desktop Application</td><td>21.93.0</td><td>This release fixes an issue where focus would be removed from the search bar in the desktop app while typing.</td></tr><tr><td>2024-12-04</td><td>Control Plane</td><td>96.98.0</td><td>This release updates access requests to now specify the requested duration and the result duration in the request step message.</td></tr><tr><td>2024-12-03</td><td>Control Plane</td><td>96.89.0</td><td>This release updates the the Approve/Deny message in the integration with Slack to include a text field where the approver can provide a note back to the requester regarding the outcome.</td></tr><tr><td>2024-12-02</td><td>CLI</td><td>45.80.0</td><td>This release updates the <code>sdm aws</code>, <code>sdm azure</code>, and <code>sdm gcp</code> CLI commands to provide a <code>--name</code> parameter and an <code>env</code> subcommand. It also updates the <code>sdm azure</code> and <code>sdm gcp</code> CLI commands to support a <code>run</code> subcommand and to store on-disk cloud SDK configuration and logs in a per-resource directory of the form <code>$SDM_HOME/azure-config/&#x26;lt;RESOURCE_ID&#x26;gt;</code> and <code>$SDM_HOME/gcloud-config/&#x26;lt;RESOURCE_ID&#x26;gt;</code> respectively, instead of a global configuration directory. In addition, the <code>sdm gcp</code> CLI command no longer supports the <code>activate</code> and <code>init</code> subcommands; To use StrongDM GCP resources, the <code>gcloud</code>, <code>run</code> and <code>env</code> commands to be used instead. Lastly, the <code>sdm gcp gsutil</code> CLI command has been deprecated; it continues to be supported but is hidden and may be removed in the future. Google no longer maintains <code>gsutil</code> and it is recommended to use <code>gcloud storage</code> (<code>sdm gcp cli storage</code>) instead.</td></tr><tr><td>2024-12-02</td><td>Control Plane</td><td>96.84.0</td><td>This release upgrades the <code>access to</code> command in the integration with Teams to support more variations that may be desired in the list of resource names and IDs.</td></tr><tr><td>2024-12-02</td><td>Control Plane</td><td>96.82.0</td><td>This release allows users to authenticate to ClickHouse through the driver with a username and private SSH key, when the users are created in the database with their public key.</td></tr><tr><td>2024-11-27</td><td>CLI</td><td>45.79.0</td><td>This release fixes an issue where <code>sdm access to</code> command in the integration with Slack caused ordinary users to get a permission error when requesting resources by name.</td></tr><tr><td>2024-11-27</td><td>Control Plane</td><td>96.75.0</td><td>This release updates the <code>/sdm access to</code> command in the integration for Slack to specify a request for multiple resources.</td></tr><tr><td>2024-11-27</td><td>CLI</td><td>45.78.0</td><td>This release splits the Duration field on AccessRequest objects in the SDKs and CLI into Requested Duration and Result Duration.</td></tr><tr><td>2024-11-27</td><td>Control Plane</td><td>96.73.0</td><td>This release splits the Duration field on AccessRequest objects in the SDKs and CLI into Requested Duration and Result Duration.</td></tr><tr><td>2024-11-27</td><td>Java SDK</td><td>11.20.0</td><td>This release splits the Duration field on AccessRequest objects in the SDKs and CLI into Requested Duration and Result Duration.</td></tr><tr><td>2024-11-27</td><td>Python SDK</td><td>11.20.0</td><td>This release splits the Duration field on AccessRequest objects in the SDKs and CLI into Requested Duration and Result Duration.</td></tr><tr><td>2024-11-27</td><td>Go SDK</td><td>11.20.0</td><td>This release splits the Duration field on AccessRequest objects in the SDKs and CLI into Requested Duration and Result Duration.</td></tr><tr><td>2024-11-27</td><td>Ruby SDK</td><td>11.20.0</td><td>This release splits the Duration field on AccessRequest objects in the SDKs and CLI into Requested Duration and Result Duration.</td></tr><tr><td>2024-11-26</td><td>Control Plane</td><td>96.69.0</td><td>This release gives the current GCP driver a more descriptive name to contrast it with new GCP functionality currently in beta.</td></tr><tr><td>2024-11-26</td><td>CLI</td><td>45.75.0</td><td>This release gives the current GCP driver a more descriptive name to contrast it with new GCP functionality currently in beta.</td></tr><tr><td>2024-11-25</td><td>Control Plane</td><td>96.60.0</td><td>This release updates the StrongDM app for Slack to display the requested duration in addition to the duration that the access request would grant upon approval.</td></tr><tr><td>2024-11-22</td><td>Control Plane</td><td>96.55.0</td><td>The format of API access keys has changed from a long Base64-encoded string to a hex string in the format <code>auth-0123abcd</code>. Existing API keys are unaffected, and the format of the secret portion of the key remains the same.</td></tr><tr><td>2024-11-22</td><td>Control Plane</td><td>96.54.0</td><td>This release allows the CLI command <code>sdm access to</code> to create requests with multiple resources. The <code>sdm access to</code> command no longer has a default duration, so it should normally be specified using the <code>-duration</code> flag.</td></tr><tr><td>2024-11-21</td><td>Control Plane</td><td>96.49.0</td><td>This release fixes a regression that caused access request creation to fail for organizations with a fixed duration setting.</td></tr><tr><td>2024-11-20</td><td>Control Plane</td><td>96.42.0</td><td>With this release, the Request Access page of the Admin UI now shows the StrongDM resource related to the action if present.</td></tr><tr><td>2024-11-19</td><td>Control Plane</td><td>96.32.0</td><td>With this release, the Microsoft Teams "Connect" link on the Admin UI Integrations page goes directly to the Teams marketplace listing for StrongDM.</td></tr><tr><td>2024-11-15</td><td>Control Plane</td><td>96.24.0</td><td>This release enables StrongDM's integration for Jira.</td></tr><tr><td>2024-11-15</td><td>CLI</td><td>45.66.0</td><td>This release fixes an issue with the queries logged for AWS Management Console resource access, including incorrect values for the "region" and "service" fields extracted from the resource's ".sdm.network" HTTP hostname. These fields are now omitted as they are not applicable to this resource. This release also improves the queries logged for Snowsight console resource access to include the full details of the HTTP request, making the queries logged for this resource consistent with other cloud resources. Lastly, this release improves the queries logged for AWS resource access to include the command that was executed from the HTTP request.</td></tr><tr><td>2024-11-14</td><td>CLI</td><td>45.62.0</td><td>With this release, Kubernetes drivers now support the latest Kubernetes cluster deployments and use websockets as the transport layer where applicable. The workaround <code>KUBECTL_REMOTE_COMMAND_WEBSOCKETS=false</code> is no longer required.</td></tr><tr><td>2024-11-12</td><td>Control Plane</td><td>95.96.0</td><td>This release allows users to be able to request multiple resources at the same time in the Admin UI.</td></tr><tr><td>2024-11-12</td><td>Terraform Provider</td><td>11.18.0</td><td>This release of the StrongDM Terraform Provider adds support for unstable GCP Workforce Identity Federation based resources.</td></tr><tr><td>2024-11-12</td><td>CLI</td><td>45.60.0</td><td>This release adds two new filters applicable to filtering queries through the <code>sdm audit</code> CLI or the Queries vertical in the SDKs: <code>policyID</code> filters queries affected by the specified policy and <code>authzDecision</code> filters queries by authorization decision (either "allow" or "deny"). These filters do not match queries that were not associated with a policy authorization.</td></tr><tr><td>2024-11-12</td><td>Control Plane</td><td>95.90.0</td><td>This release adds two new filters applicable to filtering queries through the <code>sdm audit</code> CLI or the Queries vertical in the SDKs: <code>policyID</code> filters queries affected by the specified policy and <code>authzDecision</code> filters queries by authorization decision (either "allow" or "deny"). These filters do not match queries that were not associated with a policy authorization.</td></tr><tr><td>2024-11-09</td><td>CLI</td><td>45.57.0</td><td>This release changes the name of "GCP" resources as displayed in the Admin UI and CLI from "GCP" to "GCP (Service Account)". This change only affects the displayed name and is intended to disambiguate this resource from the future introduction of other GCP resources using different authentication mechanisms.</td></tr><tr><td>2024-11-09</td><td>Control Plane</td><td>95.87.0</td><td>This release changes the name of "GCP" resources as displayed in the Admin UI and CLI from "GCP" to "GCP (Service Account)". This change only affects the displayed name and is intended to disambiguate this resource from the future introduction of other GCP resources using different authentication mechanisms.</td></tr><tr><td>2024-11-08</td><td>CLI</td><td>45.56.0</td><td>This release allows customers engaged with us for GCP Workforce Identity Federation based resources to utilize the CLI, SDKs, and Terraform provider to create resources.</td></tr><tr><td>2024-11-08</td><td>Control Plane</td><td>95.84.0</td><td>This release allows customers engaged with us for GCP Workforce Identity Federation based resources to utilize the CLI, SDKs, and Terraform provider to create resources.</td></tr><tr><td>2024-11-08</td><td>Java SDK</td><td>11.18.0</td><td>This release allows customers engaged with us for GCP Workforce Identity Federation based resources to utilize the CLI, SDKs, and Terraform provider to create resources.</td></tr><tr><td>2024-11-08</td><td>Python SDK</td><td>11.18.0</td><td>This release allows customers engaged with us for GCP Workforce Identity Federation based resources to utilize the CLI, SDKs, and Terraform provider to create resources.</td></tr><tr><td>2024-11-08</td><td>Go SDK</td><td>11.18.0</td><td>This release allows customers engaged with us for GCP Workforce Identity Federation based resources to utilize the CLI, SDKs, and Terraform provider to create resources.</td></tr><tr><td>2024-11-08</td><td>Ruby SDK</td><td>11.18.0</td><td>This release allows customers engaged with us for GCP Workforce Identity Federation based resources to utilize the CLI, SDKs, and Terraform provider to create resources.</td></tr><tr><td>2024-11-08</td><td>Control Plane</td><td>95.83.0</td><td>This release adds a new column under the Admin UI Roles page called "Users", which displays how many users are assigned to the role. In addition, the "Managed By" column is always displayed, and results can be filtered by "Managed By" when the organization has a provisioner.</td></tr><tr><td>2024-11-08</td><td>Control Plane</td><td>95.80.0</td><td>This release fixes an issue that may cause integration connected service disconnect calls to fail due to deleted StrongDM users.</td></tr><tr><td>2024-11-07</td><td>Control Plane</td><td>95.76.0</td><td>This release fixes an occasional issue where the All Requests page would error loading.</td></tr><tr><td>2024-11-06</td><td>CLI</td><td>45.54.0</td><td>This release adds a new configuration value to the Active Directory secrets engine that can be changed using: <code>&#x26;#xA;sdm admin secretengines update active_directory -id &#x26;lt;eng-id&#x26;gt; --do-not-validate-timestamps=true&#x26;#xA;</code> The default value for this configuration option is <code>false</code> and is only used in case of <code>active_directory</code>.</td></tr><tr><td>2024-11-06</td><td>Control Plane</td><td>95.59.0</td><td>This release adds a new configuration value to the Active Directory secrets engine that can be changed using: <code>&#x26;#xA;sdm admin secretengines update active_directory -id &#x26;lt;eng-id&#x26;gt; --do-not-validate-timestamps=true&#x26;#xA;</code> The default value for this configuration option is <code>false</code> and is only used in case of <code>active_directory</code>.</td></tr><tr><td>2024-11-05</td><td>Control Plane</td><td>95.56.0</td><td>This release fixes an issue with redirection when switching accounts during workflow integration setup process.</td></tr><tr><td>2024-11-05</td><td>Control Plane</td><td>95.53.0</td><td>This release improves the login state upon entering a bad password. The login screen no longer refreshes, resetting the login state. Instead, an error appears and the email is retained.</td></tr><tr><td>2024-11-01</td><td>Control Plane</td><td>95.32.0</td><td>This release improves lazy loading for the Policy Editor.</td></tr><tr><td>2024-11-01</td><td>Control Plane</td><td>95.31.0</td><td>This release fixes an issue where collapsing/expanding Policy Editor columns would increase column width unexpectedly.</td></tr><tr><td>2024-10-31</td><td>Control Plane</td><td>95.27.0</td><td>This release fixes an issue where when a user navigates directly to <code>/app/login</code> and attempts to log in using a password, they are redirected to <code>/auth/login</code>.</td></tr><tr><td>2024-10-31</td><td>CLI</td><td>45.44.0</td><td>This release adds support for the AWS (Instance Profile) resource. The AWS (Instance Profile) resource type is generally available across the Admin UI, CLI, SDKs, and StrongDM Terraform Provider. The <code>sdm aws cli</code> commands support this resource type.</td></tr><tr><td>2024-10-31</td><td>Terraform Provider</td><td>11.17.0</td><td>This release adds support for the AWS (Instance Profile) resource. The AWS (Instance Profile) resource type is generally available across the Admin UI, CLI, SDKs, and StrongDM Terraform Provider. The <code>sdm aws cli</code> commands support this resource type.</td></tr><tr><td>2024-10-31</td><td>Control Plane</td><td>95.22.0</td><td>This release adds support for the AWS (Instance Profile) resource. The AWS (Instance Profile) resource type is generally available across the Admin UI, CLI, SDKs, and StrongDM Terraform Provider. The <code>sdm aws cli</code> commands support this resource type.</td></tr><tr><td>2024-10-31</td><td>Python SDK</td><td>11.17.0</td><td>This release adds support for the AWS (Instance Profile) resource. The AWS (Instance Profile) resource type is generally available across the Admin UI, CLI, SDKs, and StrongDM Terraform Provider. The <code>sdm aws cli</code> commands support this resource type.</td></tr><tr><td>2024-10-31</td><td>Go SDK</td><td>11.17.0</td><td>This release adds support for the AWS (Instance Profile) resource. The AWS (Instance Profile) resource type is generally available across the Admin UI, CLI, SDKs, and StrongDM Terraform Provider. The <code>sdm aws cli</code> commands support this resource type.</td></tr><tr><td>2024-10-31</td><td>Ruby SDK</td><td>11.17.0</td><td>This release adds support for the AWS (Instance Profile) resource. The AWS (Instance Profile) resource type is generally available across the Admin UI, CLI, SDKs, and StrongDM Terraform Provider. The <code>sdm aws cli</code> commands support this resource type.</td></tr><tr><td>2024-10-30</td><td>CLI</td><td>45.43.0</td><td>This release adds a new healthcheck service for fetching an organization's most recent healthchecks.</td></tr><tr><td>2024-10-30</td><td>Control Plane</td><td>95.19.0</td><td>This release adds a new healthcheck service for fetching an organization's most recent healthchecks.</td></tr><tr><td>2024-10-30</td><td>Java SDK</td><td>11.16.0</td><td>This release adds a new healthcheck service for fetching an organization's most recent healthchecks.</td></tr><tr><td>2024-10-30</td><td>Python SDK</td><td>11.16.0</td><td>This release adds a new healthcheck service for fetching an organization's most recent healthchecks.</td></tr><tr><td>2024-10-30</td><td>Go SDK</td><td>11.16.0</td><td>This release adds a new healthcheck service for fetching an organization's most recent healthchecks.</td></tr><tr><td>2024-10-30</td><td>Ruby SDK</td><td>11.16.0</td><td>This release adds a new healthcheck service for fetching an organization's most recent healthchecks.</td></tr><tr><td>2024-10-29</td><td>Control Plane</td><td>95.3.0</td><td>This release enables environment variables that set the HTTP/HTTPS proxy specifically for the StrongDM client. If SDM_HTTPS_PROXY is set, the client sets HTTPS_PROXY for itself. If SDM_HTTP_PROXY is set, the client sets HTTP_PROXY for itself.</td></tr><tr><td>2024-10-28</td><td>Control Plane</td><td>94.99.0</td><td>This release fixes an issue where an update to organization IDs caused reports to break.</td></tr><tr><td>2024-10-28</td><td>Control Plane</td><td>94.94.0</td><td>This release fixes an issue where changes to a resource's health state (and certain other properties, such as the subdomain of HTTP resources) may not be reflected immediately in the desktop app.</td></tr><tr><td>2024-10-28</td><td>Control Plane</td><td>94.93.0</td><td>This release fixes the Admin UI Integrations table to update when an integration is disconnected.</td></tr><tr><td>2024-10-28</td><td>Control Plane</td><td>94.92.0</td><td>This release fixes an issue where Log Stream may fail to upload large record sets to encrypted S3 buckets due to a lack of "kms:Decrypt" permission.</td></tr><tr><td>2024-10-25</td><td>Control Plane</td><td>94.83.0</td><td>This release updates the credential retrieval modal to close after 30 minutes or when the password expires.</td></tr><tr><td>2024-10-17</td><td>CLI</td><td>45.35.0</td><td>This release updates Kubernetes drivers to support version 1.31 so that SSH session recordings are properly supported.</td></tr><tr><td>2024-10-17</td><td>Control Plane</td><td>94.64.0</td><td>This release makes all actionable buttons under the Identity Aliases tab within the Account Details page of the Admin UI disabled and hidden while logged in with an Auditor account.</td></tr><tr><td>2024-10-14</td><td>Control Plane</td><td>94.40.0</td><td>This release fixes an issue where multi-select on table rows incorrectly updated the selected row count.</td></tr><tr><td>2024-10-14</td><td>Control Plane</td><td>94.38.0</td><td>This release fixes layout inconsistencies and a scroll issue with policy logs.</td></tr><tr><td>2024-10-14</td><td>CLI</td><td>45.31.0</td><td>This release makes the <code>SSHPassword</code> resource type available.</td></tr><tr><td>2024-10-14</td><td>Java SDK</td><td>11.15.0</td><td>This release makes the <code>SSHPassword</code> resource type available.</td></tr><tr><td>2024-10-14</td><td>Terraform Provider</td><td>11.15.0</td><td>This release makes the <code>SSHPassword</code> resource type available.</td></tr><tr><td>2024-10-14</td><td>Python SDK</td><td>11.15.0</td><td>This release makes the <code>SSHPassword</code> resource type available.</td></tr><tr><td>2024-10-14</td><td>Ruby SDK</td><td>11.15.0</td><td>This release makes the <code>SSHPassword</code> resource type available.</td></tr><tr><td>2024-10-14</td><td>Go SDK</td><td>11.15.0</td><td>This release makes the <code>SSHPassword</code> resource type available.</td></tr><tr><td>2024-10-11</td><td>Control Plane</td><td>94.32.0</td><td>This release fixes a bug where an account grant could be considered revoked by an access request when it expires naturally.</td></tr><tr><td>2024-10-08</td><td>Control Plane</td><td>94.22.0</td><td>This release updates resource configuration to prohibit <code>@</code> and <code>=</code> characters in the names of new resources when they are created.</td></tr><tr><td>2024-10-08</td><td>Control Plane</td><td>94.18.0</td><td>This release fixes an issue to allow for correct email rerouting to <code>logs/rdp-replays</code>.</td></tr><tr><td>2024-10-07</td><td>CLI</td><td>45.22.0</td><td>This release adds the <code>ImpersonationUser</code> and <code>ImpersonationGroups</code> fields to the <code>sharedkernel.Capture</code> model, allowing it to be auditable via <code>sdm audit k8s</code> and in query logs. These fields are populated when the client performs user and group impersonation in Kubernetes (that is, <code>--as user --as-group group</code>).</td></tr><tr><td>2024-10-07</td><td>Java SDK</td><td>11.14.0</td><td>This release adds the <code>ImpersonationUser</code> and <code>ImpersonationGroups</code> fields to the <code>sharedkernel.Capture</code> model, allowing it to be auditable via <code>sdm audit k8s</code> and in query logs. These fields are populated when the client performs user and group impersonation in Kubernetes (that is, <code>--as user --as-group group</code>).</td></tr><tr><td>2024-10-07</td><td>Ruby SDK</td><td>11.14.0</td><td>This release adds the <code>ImpersonationUser</code> and <code>ImpersonationGroups</code> fields to the <code>sharedkernel.Capture</code> model, allowing it to be auditable via <code>sdm audit k8s</code> and in query logs. These fields are populated when the client performs user and group impersonation in Kubernetes (that is, <code>--as user --as-group group</code>).</td></tr><tr><td>2024-10-07</td><td>Python SDK</td><td>11.14.0</td><td>This release adds the <code>ImpersonationUser</code> and <code>ImpersonationGroups</code> fields to the <code>sharedkernel.Capture</code> model, allowing it to be auditable via <code>sdm audit k8s</code> and in query logs. These fields are populated when the client performs user and group impersonation in Kubernetes (that is, <code>--as user --as-group group</code>).</td></tr><tr><td>2024-10-07</td><td>Go SDK</td><td>11.14.0</td><td>This release adds the <code>ImpersonationUser</code> and <code>ImpersonationGroups</code> fields to the <code>sharedkernel.Capture</code> model, allowing it to be auditable via <code>sdm audit k8s</code> and in query logs. These fields are populated when the client performs user and group impersonation in Kubernetes (that is, <code>--as user --as-group group</code>).</td></tr><tr><td>2024-10-04</td><td>CLI</td><td>45.20.0</td><td>This release updates the <code>sdm admin users add --csv</code> CLI command help text to include the necessary tags column.</td></tr><tr><td>2024-10-04</td><td>Control Plane</td><td>94.8.0</td><td>This release makes the email Identity Set unable to be edited.</td></tr><tr><td>2024-10-03</td><td>Control Plane</td><td>94.6.0</td><td>This release fixes a 404 error that could be encountered when connecting the StrongDM app for Slack to a new workspace.</td></tr><tr><td>2024-10-03</td><td>Terraform Provider</td><td>11.14.1</td><td>This release updates the Terraform Provider documentation to include the API <code>host</code>.</td></tr><tr><td>2024-10-03</td><td>CLI</td><td>45.15.0</td><td>This release enables users to be logged in automatically to Couchbase Web UI resources, so users no longer have to log in with fake credentials.</td></tr><tr><td>2024-10-03</td><td>Control Plane</td><td>94.0.0</td><td>This release adds constants for the API host across different control planes.</td></tr><tr><td>2024-10-03</td><td>Java SDK</td><td>11.13.0</td><td>This release adds constants for the API host across different control planes.</td></tr><tr><td>2024-10-03</td><td>Terraform Provider</td><td>11.14.0</td><td>This release adds constants for the API host across different control planes.</td></tr><tr><td>2024-10-03</td><td>Python SDK</td><td>11.13.0</td><td>This release adds constants for the API host across different control planes.</td></tr><tr><td>2024-10-03</td><td>Go SDK</td><td>11.13.0</td><td>This release adds constants for the API host across different control planes.</td></tr><tr><td>2024-10-03</td><td>Ruby SDK</td><td>11.13.0</td><td>This release adds constants for the API host across different control planes.</td></tr><tr><td>2024-10-03</td><td>Control Plane</td><td>93.99.0</td><td>This release fixes an issue where the "Enroll Here" button that appears in the desktop app when the user attempting to log in is not enrolled in Okta MFA was not clickable.</td></tr><tr><td>2024-10-02</td><td>Control Plane</td><td>93.92.0</td><td>This release ensures that only nodes that pass healthcheck for a secret store are taken into account when contacting a secret store.</td></tr><tr><td>2024-10-01</td><td>Terraform Provider</td><td>11.13.1</td><td>This release fixes an issue that prevented custom timeouts from being respected.</td></tr><tr><td>2024-10-01</td><td>Terraform Provider</td><td>11.13.0</td><td>This release adds support for custom timeouts for all operations on all resources in the StrongDM Terraform provider.</td></tr><tr><td>2024-10-01</td><td>Control Plane</td><td>93.87.0</td><td>This release fixes an issue where deleting an approval workflow could cause pending requests and access workflows bound to that approval workflow to be unchangeable.</td></tr><tr><td>2024-09-30</td><td>Terraform Provider</td><td>11.12.1</td><td>Terraform data sources can now filter by more than one tag. Previously a bug prevented this from working properly.</td></tr><tr><td>2024-09-27</td><td>Control Plane</td><td>93.74.0</td><td>This release gives database-admin users read-only access to gateways and relays.</td></tr><tr><td>2024-09-27</td><td>Control Plane</td><td>93.72.0</td><td>This release is the one of the few to enable support for email pass through Identity Sets, where all Identity Aliases in the set will be the user's corresponding email address or last name. This release adds Email Identity Alias creation and updates whenever a new account is created or updated. Deletion of Identity Aliases upon account deletion was already supported. The Identity Alias creation and update will only apply to <code>user</code> and <code>service</code> account types. For users, the Identity Alias username is the user's email address. For service accounts, the Identity Alias username is the last name, which is the nickname for the service account.</td></tr><tr><td>2024-09-27</td><td>Control Plane</td><td>93.69.0</td><td>This release fixes an issue so that an error page is no longer shown momentarily while the user is logged out of the Admin UI for stale or invalid credentials.</td></tr><tr><td>2024-09-26</td><td>Control Plane</td><td>93.64.0</td><td>This release cleared the name form value for the Add Role form on submission.</td></tr><tr><td>2024-09-25</td><td>CLI</td><td>45.4.0</td><td>With the release of time in context attributes, users should expect to see policies being reevaluated, approximately once every minute, even after the initial "Allow" for "connect" actions on Postgres resources. If no time attributes are accessed by relevant policies, and no updates are made to the policies, the evaluation should continue to evaluate to "Allow." If the relevant policies make use of the time attributes, however, reevaluating relevant policies may result in "Deny," in which case, the client will sever the connection.</td></tr><tr><td>2024-09-25</td><td>Control Plane</td><td>93.59.0</td><td>With the release of time in context attributes, users should expect to see policies being reevaluated, approximately once every minute, even after the initial "Allow" for "connect" actions on Postgres resources. If no time attributes are accessed by relevant policies, and no updates are made to the policies, the evaluation should continue to evaluate to "Allow." If the relevant policies make use of the time attributes, however, reevaluating relevant policies may result in "Deny," in which case, the client will sever the connection.</td></tr><tr><td>2024-09-25</td><td>Control Plane</td><td>93.58.0</td><td>This release fixes an issue where SAML users could not finish logging in when the email they entered did not match the capitalization of the email in the system.</td></tr><tr><td>2024-09-24</td><td>Desktop Application</td><td>21.87.0</td><td>This release adds an alert on the desktop app when another user on the machine is currently running the desktop app. The second user will have to quit the app and wait until the other desktop app instance is closed in order to continue. This release also fixes an issue where clicking the dock icon in macOS showed the desktop app's Resource Center window.</td></tr><tr><td>2024-09-23</td><td>CLI</td><td>44.97.0</td><td>This release adds a new <code>context.utcNow.timestamp</code> attribute for context-based policy allowing policies to be written against properties of the time at which authorization is performed. The value of this attribute is the current time (in UTC) as a Cedar <code>datetime</code> value.</td></tr><tr><td>2024-09-23</td><td>Control Plane</td><td>93.46.0</td><td>This release adds a new <code>context.utcNow.timestamp</code> attribute for context-based policy allowing policies to be written against properties of the time at which authorization is performed. The value of this attribute is the current time (in UTC) as a Cedar <code>datetime</code> value.</td></tr><tr><td>2024-09-19</td><td>CLI</td><td>44.95.0</td><td>This release adds new temporal attributes for context-based policy, allowing policies to be written against properties of the current time (in UTC) when authorization is performed. The new context attributes include <code>context.utcNow.dayOfWeek</code> (a number representing the current day of week from 1-7, which is Sun-Sat), <code>context.utcNow.day</code> (a number representing the current day of the month, such as 31), <code>context.utcNow.month</code> (a number representing the current month from 1-12, which is Jan-Dec), and <code>context.utcNow.year</code> (a number representing the current four digit year, such as 2024).</td></tr><tr><td>2024-09-19</td><td>Control Plane</td><td>93.33.0</td><td>This release adds new temporal attributes for context-based policy, allowing policies to be written against properties of the current time (in UTC) when authorization is performed. The new context attributes include <code>context.utcNow.dayOfWeek</code> (a number representing the current day of week from 1-7, which is Sun-Sat), <code>context.utcNow.day</code> (a number representing the current day of the month, such as 31), <code>context.utcNow.month</code> (a number representing the current month from 1-12, which is Jan-Dec), and <code>context.utcNow.year</code> (a number representing the current four digit year, such as 2024).</td></tr><tr><td>2024-09-18</td><td>Control Plane</td><td>93.15.0</td><td>This release enables support for email to pass through Identity Sets, so that all Identity Aliases in the Identity Set are the user's corresponding email address. This release also adds the new read-only email Identity Set for new organizations. Existing orgs will be backfilled at a later release.</td></tr><tr><td>2024-09-17</td><td>Control Plane</td><td>93.5.0</td><td>This release updates the StrongDM Admin UI with a new navigation menu and updates both the Admin UI and desktop app with a refreshed layout, colors, and styling.</td></tr><tr><td>2024-09-16</td><td>Control Plane</td><td>92.97.0</td><td>This release adds a new organization setting, Enforce Single Session. This setting allows organization admins to restrict concurrent sessions for logged in users to a single session for the StrongDM Admin UI and a single session for desktop. With this setting enabled, if a user who is logged in to the Admin UI on one machine (or browser) logs in on another machine (or browser), the first session is revoked and the user is logged out of that session. The second session will still be preserved.</td></tr><tr><td>2024-09-16</td><td>Java SDK</td><td>11.10.1</td><td>This release adds a new organization setting, Enforce Single Session. This setting allows organization admins to restrict concurrent sessions for logged in users to a single session for the StrongDM Admin UI and a single session for desktop. With this setting enabled, if a user who is logged in to the Admin UI on one machine (or browser) logs in on another machine (or browser), the first session is revoked and the user is logged out of that session. The second session will still be preserved.</td></tr><tr><td>2024-09-16</td><td>Python SDK</td><td>11.10.1</td><td>This release adds a new organization setting, Enforce Single Session. This setting allows organization admins to restrict concurrent sessions for logged in users to a single session for the StrongDM Admin UI and a single session for desktop. With this setting enabled, if a user who is logged in to the Admin UI on one machine (or browser) logs in on another machine (or browser), the first session is revoked and the user is logged out of that session. The second session will still be preserved.</td></tr><tr><td>2024-09-16</td><td>Ruby SDK</td><td>11.10.1</td><td>This release adds a new organization setting, Enforce Single Session. This setting allows organization admins to restrict concurrent sessions for logged in users to a single session for the StrongDM Admin UI and a single session for desktop. With this setting enabled, if a user who is logged in to the Admin UI on one machine (or browser) logs in on another machine (or browser), the first session is revoked and the user is logged out of that session. The second session will still be preserved.</td></tr><tr><td>2024-09-16</td><td>Go SDK</td><td>11.10.1</td><td>This release adds a new organization setting, Enforce Single Session. This setting allows organization admins to restrict concurrent sessions for logged in users to a single session for the StrongDM Admin UI and a single session for desktop. With this setting enabled, if a user who is logged in to the Admin UI on one machine (or browser) logs in on another machine (or browser), the first session is revoked and the user is logged out of that session. The second session will still be preserved.</td></tr><tr><td>2024-09-13</td><td>CLI</td><td>44.75.0</td><td>This release adds support to the Account update API and SDKs for setting the password of a user account. This ability to set a user password is only permitted by new API keys that have been explicitly assigned a new Password Set permission.</td></tr><tr><td>2024-09-11</td><td>Control Plane</td><td>92.79.0</td><td>This release adds support to the Account update API and SDKs for setting the password of a user account. This ability to set a user password is only permitted by new API keys that have been explicitly assigned a new Password Set permission.</td></tr><tr><td>2024-09-11</td><td>Java SDK</td><td>11.10.0</td><td>This release adds support to the Account update API and SDKs for setting the password of a user account. This ability to set a user password is only permitted by new API keys that have been explicitly assigned a new Password Set permission.</td></tr><tr><td>2024-09-11</td><td>Python SDK</td><td>11.10.0</td><td>This release adds support to the Account update API and SDKs for setting the password of a user account. This ability to set a user password is only permitted by new API keys that have been explicitly assigned a new Password Set permission.</td></tr><tr><td>2024-09-11</td><td>Ruby SDK</td><td>11.10.0</td><td>This release adds support to the Account update API and SDKs for setting the password of a user account. This ability to set a user password is only permitted by new API keys that have been explicitly assigned a new Password Set permission.</td></tr><tr><td>2024-09-11</td><td>Go SDK</td><td>11.10.0</td><td>This release adds support to the Account update API and SDKs for setting the password of a user account. This ability to set a user password is only permitted by new API keys that have been explicitly assigned a new Password Set permission.</td></tr><tr><td>2024-09-11</td><td>CLI</td><td>44.65.0</td><td>This release adds support for Couchbase resources. The Couchbase and Couchbase (WebUI) resource types are now generally available across the Admin UI, CLI, SDKs, and StrongDM Terraform Provider.</td></tr><tr><td>2024-09-11</td><td>Terraform Provider</td><td>11.9.0</td><td>This release adds support for Couchbase resources. The Couchbase and Couchbase (WebUI) resource types are now generally available across the Admin UI, CLI, SDKs, and StrongDM Terraform Provider.</td></tr><tr><td>2024-09-11</td><td>Control Plane</td><td>92.75.0</td><td>This release adds support for Couchbase resources. The Couchbase and Couchbase (WebUI) resource types are now generally available across the Admin UI, CLI, SDKs, and StrongDM Terraform Provider.</td></tr><tr><td>2024-09-11</td><td>Java SDK</td><td>11.9.0</td><td>This release adds support for Couchbase resources. The Couchbase and Couchbase (WebUI) resource types are now generally available across the Admin UI, CLI, SDKs, and StrongDM Terraform Provider.</td></tr><tr><td>2024-09-11</td><td>Python SDK</td><td>11.9.0</td><td>This release adds support for Couchbase resources. The Couchbase and Couchbase (WebUI) resource types are now generally available across the Admin UI, CLI, SDKs, and StrongDM Terraform Provider.</td></tr><tr><td>2024-09-11</td><td>Go SDK</td><td>11.9.0</td><td>This release adds support for Couchbase resources. The Couchbase and Couchbase (WebUI) resource types are now generally available across the Admin UI, CLI, SDKs, and StrongDM Terraform Provider.</td></tr><tr><td>2024-09-11</td><td>Ruby SDK</td><td>11.9.0</td><td>This release adds support for Couchbase resources. The Couchbase and Couchbase (WebUI) resource types are now generally available across the Admin UI, CLI, SDKs, and StrongDM Terraform Provider.</td></tr><tr><td>2024-09-09</td><td>CLI</td><td>44.60.0</td><td>This release makes two changes have been made to the JSON format of the authorization information that is included in the <code>authz</code> field in query event logs. The <code>&#x26;#34;policy&#x26;#34;</code> field has been removed in favor of a <code>&#x26;#34;policyId&#x26;#34;</code> field. The type has also changed from an int to a string, which is the appropriate Cedar JSON format for policy IDs. The keys of the <code>&#x26;#34;position&#x26;#34;</code> objects have changed to lower case from Pascal case.</td></tr><tr><td>2024-09-09</td><td>Control Plane</td><td>92.66.0</td><td>This release makes two changes have been made to the JSON format of the authorization information that is included in the <code>authz</code> field in query event logs. The <code>&#x26;#34;policy&#x26;#34;</code> field has been removed in favor of a <code>&#x26;#34;policyId&#x26;#34;</code> field. The type has also changed from an int to a string, which is the appropriate Cedar JSON format for policy IDs. The keys of the <code>&#x26;#34;position&#x26;#34;</code> objects have changed to lower case from Pascal case.</td></tr><tr><td>2024-09-09</td><td>Control Plane</td><td>92.65.0</td><td>This release adds the <code>support_login_user</code> filter for listing activities via the <code>sdm audit activities --filter</code> command.</td></tr><tr><td>2024-09-03</td><td>Control Plane</td><td>92.46.0</td><td>This release adds support for selecting LDAP schema by setting the schema query param in the URL. By default it is <code>ad</code> (Active Directory) but can be set to <code>openldap</code> by providing the schema query param (<code>ldaps://127.0.0.1?schema=openldap</code>).</td></tr><tr><td>2024-09-03</td><td>CLI</td><td>44.55.0</td><td>This release updates the GCP Secret Manager to store paths relative to secret manager root path (/projects/&#x3C;project-id>). It also normalizes the names of managed secrets into the secret path by changing '/' characters into double underscore characters.</td></tr><tr><td>2024-09-03</td><td>Control Plane</td><td>92.43.0</td><td>This release updates the GCP Secret Manager to store paths relative to secret manager root path (/projects/&#x3C;project-id>). It also normalizes the names of managed secrets into the secret path by changing '/' characters into double underscore characters.</td></tr><tr><td>2024-08-29</td><td>CLI</td><td>44.48.0</td><td>This release fixes a rare memory leak in the gateway that can occur when connections are forwarded through a relay and there are repeated egress connection failures to one or more resources on the relay.</td></tr><tr><td>2024-08-28</td><td>Control Plane</td><td>92.22.0</td><td>This release fixes an issue with Slack access requests where duplicate resources made granting access impossible.</td></tr><tr><td>2024-08-27</td><td>CLI</td><td>44.44.0</td><td>This release fixes potential interoperability issues between the StrongDM CLI and some third-party vendor firewall and packet filtering applications due to a recent change in Go to enable a experimental post-quantum key exchange mechanism in TLS negotiations by default. This mechanism has been temporarily disabled until such issues are resolved.</td></tr><tr><td>2024-08-27</td><td>Control Plane</td><td>92.17.0</td><td>This release fixes potential interoperability issues between the StrongDM CLI and some third-party vendor firewall and packet filtering applications due to a recent change in Go to enable a experimental post-quantum key exchange mechanism in TLS negotiations by default. This mechanism has been temporarily disabled until such issues are resolved.</td></tr><tr><td>2024-08-27</td><td>Desktop Application</td><td>21.83.0</td><td>This release updates the desktop app with new icons and colors, enhances the user experience around layout and filters, and adds tabs for navigation.</td></tr><tr><td>2024-08-26</td><td>CLI</td><td>44.42.0</td><td>This change updates the output of <code>sdm audit access-requests</code> to add requester name, reason, duration, and account grant(s) information to the output.</td></tr><tr><td>2024-08-24</td><td>Control Plane</td><td>92.9.0</td><td>This change updates the output of <code>sdm audit access-requests</code> to add requester name, reason, duration, and account grant(s) information to the output.</td></tr><tr><td>2024-08-24</td><td>Java SDK</td><td>11.8.0</td><td>This change updates the output of <code>sdm audit access-requests</code> to add requester name, reason, duration, and account grant(s) information to the output.</td></tr><tr><td>2024-08-24</td><td>Ruby SDK</td><td>11.8.0</td><td>This change updates the output of <code>sdm audit access-requests</code> to add requester name, reason, duration, and account grant(s) information to the output.</td></tr><tr><td>2024-08-24</td><td>Go SDK</td><td>11.8.0</td><td>This change updates the output of <code>sdm audit access-requests</code> to add requester name, reason, duration, and account grant(s) information to the output.</td></tr><tr><td>2024-08-24</td><td>Python SDK</td><td>11.8.0</td><td>This change updates the output of <code>sdm audit access-requests</code> to add requester name, reason, duration, and account grant(s) information to the output.</td></tr><tr><td>2024-08-23</td><td>Control Plane</td><td>92.4.0</td><td>This release fixes an issue in the Policy Editor where incorrect completion suggestions may be provided based on other content in the policy.</td></tr><tr><td>2024-08-22</td><td>Control Plane</td><td>92.1.0</td><td>This change adds a new "PingID (OIDC)" SSO provider.</td></tr><tr><td>2024-08-21</td><td>Control Plane</td><td>91.98.0</td><td>This release resolves an issue where some resources were not able to be updated due to a unique validation on a field that was not required or visible to the user.</td></tr><tr><td>2024-08-20</td><td>Control Plane</td><td>91.96.0</td><td>Policy-based action control for PostgreSQL databases is now supported for Aurora PostgreSQL, Cockroach, GreenPlum, and RDS PostgreSQL IAM resources.</td></tr><tr><td>2024-08-14</td><td>Control Plane</td><td>91.73.0</td><td>This release adds a few activity verbs involving workflows to SDKs for completeness. These verbs are no longer used currently, but in audit trails, can still be requested. The verbs in question: <code>ActivityVerbDeprecatedWorkflowResourceAssigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceUnassigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceMultipleAssigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceMultipleUnassigned</code>, <code>ActivityVerbDeprecatedWorkflowApproversUpdated</code>, <code>ActivityVerbDeprecatedWorkflowAutoGrantUpdated</code>, <code>ActivityVerbDeprecatedWorkflowApprovalCriteriaUpdated</code></td></tr><tr><td>2024-08-14</td><td>Terraform Provider</td><td>11.7.0</td><td>This release adds a few activity verbs involving workflows to SDKs for completeness. These verbs are no longer used currently, but in audit trails, can still be requested. The verbs in question: <code>ActivityVerbDeprecatedWorkflowResourceAssigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceUnassigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceMultipleAssigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceMultipleUnassigned</code>, <code>ActivityVerbDeprecatedWorkflowApproversUpdated</code>, <code>ActivityVerbDeprecatedWorkflowAutoGrantUpdated</code>, <code>ActivityVerbDeprecatedWorkflowApprovalCriteriaUpdated</code></td></tr><tr><td>2024-08-14</td><td>Java SDK</td><td>11.7.0</td><td>This release adds a few activity verbs involving workflows to SDKs for completeness. These verbs are no longer used currently, but in audit trails, can still be requested. The verbs in question: <code>ActivityVerbDeprecatedWorkflowResourceAssigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceUnassigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceMultipleAssigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceMultipleUnassigned</code>, <code>ActivityVerbDeprecatedWorkflowApproversUpdated</code>, <code>ActivityVerbDeprecatedWorkflowAutoGrantUpdated</code>, <code>ActivityVerbDeprecatedWorkflowApprovalCriteriaUpdated</code></td></tr><tr><td>2024-08-14</td><td>Python SDK</td><td>11.7.0</td><td>This release adds a few activity verbs involving workflows to SDKs for completeness. These verbs are no longer used currently, but in audit trails, can still be requested. The verbs in question: <code>ActivityVerbDeprecatedWorkflowResourceAssigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceUnassigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceMultipleAssigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceMultipleUnassigned</code>, <code>ActivityVerbDeprecatedWorkflowApproversUpdated</code>, <code>ActivityVerbDeprecatedWorkflowAutoGrantUpdated</code>, <code>ActivityVerbDeprecatedWorkflowApprovalCriteriaUpdated</code></td></tr><tr><td>2024-08-14</td><td>Go SDK</td><td>11.7.0</td><td>This release adds a few activity verbs involving workflows to SDKs for completeness. These verbs are no longer used currently, but in audit trails, can still be requested. The verbs in question: <code>ActivityVerbDeprecatedWorkflowResourceAssigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceUnassigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceMultipleAssigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceMultipleUnassigned</code>, <code>ActivityVerbDeprecatedWorkflowApproversUpdated</code>, <code>ActivityVerbDeprecatedWorkflowAutoGrantUpdated</code>, <code>ActivityVerbDeprecatedWorkflowApprovalCriteriaUpdated</code></td></tr><tr><td>2024-08-14</td><td>Ruby SDK</td><td>11.7.0</td><td>This release adds a few activity verbs involving workflows to SDKs for completeness. These verbs are no longer used currently, but in audit trails, can still be requested. The verbs in question: <code>ActivityVerbDeprecatedWorkflowResourceAssigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceUnassigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceMultipleAssigned</code>, <code>ActivityVerbDeprecatedWorkflowResourceMultipleUnassigned</code>, <code>ActivityVerbDeprecatedWorkflowApproversUpdated</code>, <code>ActivityVerbDeprecatedWorkflowAutoGrantUpdated</code>, <code>ActivityVerbDeprecatedWorkflowApprovalCriteriaUpdated</code></td></tr><tr><td>2024-08-13</td><td>Java SDK</td><td>11.6.1</td><td>This release updates javadocs for the Java SDK.</td></tr><tr><td>2024-08-08</td><td>Control Plane</td><td>91.50.0</td><td>This release causes dead relays or gateways that are pruned (30 days old without a heartbeat) to also emit an activity log.</td></tr><tr><td>2024-08-07</td><td>Control Plane</td><td>91.48.0</td><td>This release adds policy fields AuthzJSON and Target to the queries API.</td></tr><tr><td>2024-08-07</td><td>Python SDK</td><td>11.5.1</td><td>This release adds policy fields AuthzJSON and Target to the queries API.</td></tr><tr><td>2024-08-07</td><td>Ruby SDK</td><td>11.5.1</td><td>This release adds policy fields AuthzJSON and Target to the queries API.</td></tr><tr><td>2024-08-07</td><td>Go SDK</td><td>11.5.1</td><td>This release adds policy fields AuthzJSON and Target to the queries API.</td></tr><tr><td>2024-08-06</td><td>CLI</td><td>44.28.0</td><td>This release adds the <code>--permissions-help</code> flag to the <code>admin tokens add</code> command to show all available permissions and their descriptions. <code>sdm admin tokens add --permissions-help</code> will list all of the allowed permissions.</td></tr><tr><td>2024-08-06</td><td>Control Plane</td><td>91.45.0</td><td>This release adds the <code>--permissions-help</code> flag to the <code>admin tokens add</code> command to show all available permissions and their descriptions. <code>sdm admin tokens add --permissions-help</code> will list all of the allowed permissions.</td></tr><tr><td>2024-08-06</td><td>CLI</td><td>44.27.0</td><td>This release deprecates the <code>KubernetesBasicAuth</code> and <code>AKSBasicAuth</code> resource types.</td></tr><tr><td>2024-08-06</td><td>Control Plane</td><td>91.44.0</td><td>This release deprecates the <code>KubernetesBasicAuth</code> and <code>AKSBasicAuth</code> resource types.</td></tr><tr><td>2024-08-06</td><td>Terraform Provider</td><td>11.4.0</td><td>This release deprecates the <code>KubernetesBasicAuth</code> and <code>AKSBasicAuth</code> resource types.</td></tr><tr><td>2024-08-06</td><td>Python SDK</td><td>11.4.0</td><td>This release deprecates the <code>KubernetesBasicAuth</code> and <code>AKSBasicAuth</code> resource types.</td></tr><tr><td>2024-08-06</td><td>Ruby SDK</td><td>11.4.0</td><td>This release deprecates the <code>KubernetesBasicAuth</code> and <code>AKSBasicAuth</code> resource types.</td></tr><tr><td>2024-08-06</td><td>Go SDK</td><td>11.4.0</td><td>This release deprecates the <code>KubernetesBasicAuth</code> and <code>AKSBasicAuth</code> resource types.</td></tr><tr><td>2024-08-05</td><td>CLI</td><td>44.25.0</td><td>This release adds <code>sdm audit policies</code> command to the CLI to list policies existing at a given timestamp.</td></tr><tr><td>2024-08-02</td><td>CLI</td><td>44.23.0</td><td>This release adds <code>sdm admin policies</code> commands to the CLI to manage policies. It provides create, update, delete and list operations for policies.</td></tr><tr><td>2024-08-01</td><td>Control Plane</td><td>91.29.0</td><td>This release resolves a bug introduced in 91.24.0 where users, when unauthenticated via a session timeout, could enter an error page without the ability to log out.</td></tr><tr><td>2024-08-01</td><td>Control Plane</td><td>91.28.0</td><td>This adds support for the Policies API.</td></tr><tr><td>2024-08-01</td><td>Java SDK</td><td>11.3.0</td><td>This adds support for the Policies API.</td></tr><tr><td>2024-08-01</td><td>Python SDK</td><td>11.3.0</td><td>This adds support for the Policies API.</td></tr><tr><td>2024-08-01</td><td>Go SDK</td><td>11.3.0</td><td>This adds support for the Policies API.</td></tr><tr><td>2024-08-01</td><td>Ruby SDK</td><td>11.3.0</td><td>This adds support for the Policies API.</td></tr><tr><td>2024-08-01</td><td>Control Plane</td><td>91.26.0</td><td>This release updates the CrowdStrike integration to use the full set of network interfaces collected from the CrowdStrike API to detect the device agent corresponding to a given StrongDM client. Previously, devices with multiple network interfaces could potentially have been unable to identify a device trust score.</td></tr><tr><td>2024-07-29</td><td>Control Plane</td><td>90.98.0</td><td>Policy-Based Action Control (PBAC) is now generally available to all Enterprise customers. Fine-grained authorization is now performed against all PostgreSQL database actions and the Policy Editor in the Admin UI has been enhanced to support creating policies to authorize these actions.</td></tr><tr><td>2024-07-29</td><td>CLI</td><td>44.4.0</td><td>This release adds support for the <code>VAULT_TOKEN_RENEW_BEHAVIOR</code> environment variable. Supported values are <code>STOP_ON_ERROR</code>, which, if the token renewal fails it will stop renewal process, and login will be attempted on the next healthcheck attempt; and <code>DISABLED</code>, which will disable token renewal, and login will happen again after the current token is expired.</td></tr><tr><td>2024-07-26</td><td>Control Plane</td><td>90.88.0</td><td>This change updates the format of some metadata in various emails sent from the StrongDM control plane.</td></tr><tr><td>2024-07-25</td><td>Desktop Application</td><td>21.80.0</td><td>This release updates the desktop app to show the following menu items when the dock icon (on macOS) or the tray icon (for Windows) is right-clicked: <strong>Open app.strongdm.com</strong>, which opens the Admin UI in the web browser; and <strong>Connect All</strong>, which connects to all assigned resources and is only visible when authenticated. In addition, this release fixes the main desktop app menu options in macOS to be <strong>About StrongDM</strong> and <strong>Quit StrongDM</strong> instead of <strong>About desktop</strong> and <strong>Quit desktop</strong>. The main desktop app menu also adds the <strong>Log Out</strong> option when authenticated and <strong>Log In</strong> when unauthenticated.</td></tr><tr><td>2024-07-23</td><td>Control Plane</td><td>90.71.0</td><td>This release ensures there will be no more friction for updating resources if your resource has Strong Vault as its default secret store and you have disallowed credentials to be stored with StrongDM.</td></tr><tr><td>2024-07-23</td><td>CLI</td><td>43.94.0</td><td>This release fixes a bug in the <code>sdm audit permissions</code> CLI command where a filter specified by the <code>--filter</code> parameter was being ignored, causing results not to be filtered.</td></tr><tr><td>2024-07-23</td><td>Control Plane</td><td>90.69.0</td><td>This release fixes a bug with explicit routing enabled in strict or exclusive enforcement mode, where relays may be incorrectly reported as "isolated" in the Admin UI.</td></tr><tr><td>2024-07-23</td><td>Control Plane</td><td>90.61.0</td><td>This release fixes a connection error for Mongo legacy resource types when used with older gateways, reverting to continue using an old behavior mode.</td></tr><tr><td>2024-07-22</td><td>Control Plane</td><td>90.56.0</td><td>This change fixes a presentation bug that caused shrunken dashboards in the Reports Library.</td></tr><tr><td>2024-07-22</td><td>CLI</td><td>43.91.0</td><td>This release resolves an incompatibility using the RDS PostgreSQL (IAM) resource type with policies, introduced in version 43.84.0.</td></tr><tr><td>2024-07-19</td><td>Control Plane</td><td>90.53.0</td><td>When creating a website resource, the subdomain field will provide an error about max length when longer than 256 characters.</td></tr><tr><td>2024-07-19</td><td>CLI</td><td>43.88.0</td><td>This change augments <code>sdm doctor -v</code> and the desktop app's diagnostic output to include short descriptions of some common problems (for example, inability to reach gateways or api.strongdm.com).</td></tr><tr><td>2024-07-19</td><td>Control Plane</td><td>90.47.0</td><td>This release adds an example to the Log Stream page of the Admin UI, indicating how to set up CMK usage.</td></tr><tr><td>2024-07-18</td><td>Control Plane</td><td>90.41.0</td><td>This release adjusts StrongDM's syncing logic with CrowdStrike to prevent delays in updates to retrieved device trust scores when invalid API tokens are provided to StrongDM.</td></tr><tr><td>2024-07-18</td><td>Control Plane</td><td>90.40.0</td><td>This release fixes an issue where an idle timeout duration greater than 24 days caused users to log out immediately.</td></tr><tr><td>2024-07-17</td><td>Java SDK</td><td>11.1.0</td><td>This release updates which Mongo drivers are unstable per their legacy naming.</td></tr><tr><td>2024-07-17</td><td>Terraform Provider</td><td>11.1.0</td><td>This release updates which Mongo drivers are unstable per their legacy naming.</td></tr><tr><td>2024-07-17</td><td>Python SDK</td><td>11.1.0</td><td>This release updates which Mongo drivers are unstable per their legacy naming.</td></tr><tr><td>2024-07-17</td><td>Ruby SDK</td><td>11.1.0</td><td>This release updates which Mongo drivers are unstable per their legacy naming.</td></tr><tr><td>2024-07-17</td><td>Go SDK</td><td>11.1.0</td><td>This release updates which Mongo drivers are unstable per their legacy naming.</td></tr><tr><td>2024-07-16</td><td>Control Plane</td><td>90.32.0</td><td>This release addresses the following third party CVEs: CVE-2024-36138,CVE-2024-22020,CVE-2024-22018,CVE-2024-36137,CVE-2024-37372</td></tr><tr><td>2024-07-16</td><td>Control Plane</td><td>90.30.0</td><td>This change adds support for ALTER EXTENSION statements as parsed SQL actions</td></tr><tr><td>2024-07-15</td><td>CLI</td><td>43.73.0</td><td>Fix filters help responses for approval workflows commands</td></tr><tr><td>2024-07-12</td><td>Control Plane</td><td>90.19.0</td><td>This release adds the <code>egressNodeID</code> field to log stream query outputs, reflecting the final node which processed a query and sent it directly to a resource.</td></tr><tr><td>2024-07-12</td><td>Control Plane</td><td>90.17.0</td><td>This release adds Okta Verify as a supported MFA provider.</td></tr><tr><td>2024-07-11</td><td>CLI</td><td>43.69.0</td><td>This release removes the outdated flags <code>--connect-to-replica</code> and <code>--replica-set</code> from the <code>sdm admin resources create mongo</code> command.</td></tr><tr><td>2024-07-11</td><td>Terraform Provider</td><td>11.0.0</td><td>This release removes some deprecated fields from Mongo resource types.</td></tr><tr><td>2024-07-11</td><td>Java SDK</td><td>11.0.0</td><td>This release removes some deprecated fields from Mongo resource types.</td></tr><tr><td>2024-07-11</td><td>Python SDK</td><td>11.0.0</td><td>This release removes some deprecated fields from Mongo resource types.</td></tr><tr><td>2024-07-11</td><td>Go SDK</td><td>11.0.0</td><td>This release removes some deprecated fields from Mongo resource types.</td></tr><tr><td>2024-07-11</td><td>Ruby SDK</td><td>11.0.0</td><td>This release removes some deprecated fields from Mongo resource types.</td></tr><tr><td>2024-07-10</td><td>Control Plane</td><td>90.7.0</td><td>This release addresses the following third party CVEs: CVE-2024-6104, CVE-2024-6257</td></tr><tr><td>2024-07-10</td><td>CLI</td><td>43.65.0</td><td>This release adds the loopback range to the organization history API.</td></tr><tr><td>2024-07-10</td><td>Java SDK</td><td>9.7.0</td><td>This release adds the loopback range to the organization history API.</td></tr><tr><td>2024-07-10</td><td>Python SDK</td><td>9.7.0</td><td>This release adds the loopback range to the organization history API.</td></tr><tr><td>2024-07-10</td><td>Ruby SDK</td><td>9.7.0</td><td>This release adds the loopback range to the organization history API.</td></tr><tr><td>2024-07-10</td><td>Go SDK</td><td>9.7.0</td><td>This release adds the loopback range to the organization history API.</td></tr><tr><td>2024-07-10</td><td>CLI</td><td>43.63.0</td><td>Many CLI commands currently do not have validation against incorrect number of arguments being provided. This release adds those validations.</td></tr><tr><td>2024-07-09</td><td>Control Plane</td><td>89.99.0</td><td>In the event an access request has more than one resource associated with it, typically through an approval workflow associated with a policy, all resources will now be listed in the access request details.</td></tr><tr><td>2024-07-08</td><td>Control Plane</td><td>89.92.0</td><td>This release fixes an issue in the Admin UI where resources could not be created if there are no Identity Sets.</td></tr><tr><td>2024-07-05</td><td>CLI</td><td>43.58.0</td><td>On Linux, "sdm install" has a new -nostart flag that can be used when users want to complete the installation without actually starting the service.</td></tr><tr><td>2024-07-03</td><td>Terraform Provider</td><td>10.5.0</td><td>This change adds a resource type for SSH password authentication.</td></tr><tr><td>2024-07-03</td><td>Java SDK</td><td>9.6.0</td><td>This change adds a resource type for SSH password authentication.</td></tr><tr><td>2024-07-03</td><td>Ruby SDK</td><td>9.6.0</td><td>This change adds a resource type for SSH password authentication.</td></tr><tr><td>2024-07-03</td><td>Python SDK</td><td>9.6.0</td><td>This change adds a resource type for SSH password authentication.</td></tr><tr><td>2024-07-03</td><td>Go SDK</td><td>9.6.0</td><td>This change adds a resource type for SSH password authentication.</td></tr><tr><td>2024-07-02</td><td>Control Plane</td><td>89.81.0</td><td>This release allows the Port Override field to be set when creating or updating a cloud resource, as with other resources. Previously this field was only visible and editable for cloud resources through the CLI or SDKs.</td></tr><tr><td>2024-07-01</td><td>CLI</td><td>43.53.0</td><td>This release removes the "alterUser" SQL action, treating such calls as aliases for ALTER ROLE.</td></tr><tr><td>2024-07-01</td><td>Control Plane</td><td>89.74.0</td><td>This release removes the "alterUser" SQL action, treating such calls as aliases for ALTER ROLE.</td></tr><tr><td>2024-07-01</td><td>Desktop Application</td><td>21.76.0</td><td>This release updates colors within the desktop app.</td></tr><tr><td>2024-06-27</td><td>Desktop Application</td><td>21.74.0</td><td>This release updates the desktop app so that when clicking the taskbar icon, the Resource Center window opens or is in focus instead of the Account menu opening. This change also puts the Account menu within the header of the Resource Center window.</td></tr><tr><td>2024-06-27</td><td>Control Plane</td><td>89.59.0</td><td>This release fixes a duplicate footer and image for TOTP MFA enrollment success.</td></tr><tr><td>2024-06-26</td><td>Control Plane</td><td>89.54.0</td><td>This fixes an issue for DBAs that caused the resource page not to load.</td></tr><tr><td>2024-06-26</td><td>CLI</td><td>43.31.0</td><td>This changes the Microsoft Defender Device Trust checks to be evaluated against the required trust level "as expected" (fixing a previously present in the code bug).</td></tr><tr><td>2024-06-26</td><td>Control Plane</td><td>89.52.0</td><td>This changes the Microsoft Defender Device Trust checks to be evaluated against the required trust level "as expected" (fixing a previously present in the code bug).</td></tr><tr><td>2024-06-25</td><td>Control Plane</td><td>89.45.0</td><td>This release resolves an issue where the navigation layout sometimes flickered before the login screen. It also resolves an issue with idle timeouts not correctly logging users out, and an issue with Parent-Child organization logins via the Admin UI.</td></tr><tr><td>2024-06-24</td><td>CLI</td><td>43.15.0</td><td>This release changes connection behavior to proactively close idle connections when proxying HTTP requests in order to reduce the memory profile of high volume HTTP requests for both nodes and clients.</td></tr><tr><td>2024-06-21</td><td>CLI</td><td>43.4.0</td><td>This release addresses the following third party CVEs: CVE-2024-35255</td></tr><tr><td>2024-06-21</td><td>Control Plane</td><td>89.22.0</td><td>This release addresses the following third party CVEs: CVE-2023-49559</td></tr><tr><td>2024-06-18</td><td>Java SDK</td><td>9.4.0</td><td>This release adds the ability to configure the following cluster type resources for discovery to the CLI, SDKs and the SDM Terraform Provider: Kubernetes, KubernetesServiceAccount, AKS, AKSServiceAccount, AmazonEKS, AmazonEKSInstanceProfile, GoogleGKE. The feature is not yet Generally Available and may not be available to your organization yet.</td></tr><tr><td>2024-06-18</td><td>Control Plane</td><td>89.10.0</td><td>This release adds more informational links to the MFA settings section in the Admin UI, including separate links for Duo, Okta, and TOTP setup.</td></tr><tr><td>2024-06-18</td><td>Control Plane</td><td>89.5.0</td><td>This release updates the text on the Microsoft Defender option for Device Trust in the Admin UI.</td></tr><tr><td>2024-06-18</td><td>CLI</td><td>42.97.0</td><td>This release renames the CLI's <code>admin relays</code> tree to <code>admin nodes</code> with accompanying help text updates. Node is the more generic term that encompasses both gateways and relays. An alias for relays remains to prevent breakage in existing scripts. Similarly, the CLI's <code>audit relays</code> command has been renamed to <code>audit nodes</code> with accompanying help text updates. An alias for relays remains to prevent breakage in existing scripts.</td></tr><tr><td>2024-06-18</td><td>CLI</td><td>42.96.0</td><td>This release adds support for Mongo 7 and Mongo 8 (tested with RC8).</td></tr><tr><td>2024-06-18</td><td>CLI</td><td>42.95.0</td><td>This change adds support to parse ALTER DEFAULT PRIVILEGES statements as actions for Postgres resources.</td></tr><tr><td>2024-06-18</td><td>Control Plane</td><td>89.4.0</td><td>This change adds support to parse ALTER DEFAULT PRIVILEGES statements as actions for Postgres resources.</td></tr><tr><td>2024-06-17</td><td>CLI</td><td>42.93.0</td><td><p>This release adds the ability to configure the following cluster type resources for discovery to the CLI, SDKs and the SDM Terraform Provider: Kubernetes, KubernetesServiceAccount, AKS, AKSServiceAccount, AmazonEKS, AmazonEKSInstanceProfile, GoogleGKE.</p><p>The feature is not yet Generally Available and may not be available to your organization yet.</p></td></tr><tr><td>2024-06-17</td><td>Control Plane</td><td>89.3.0</td><td><p>This release adds the ability to configure the following cluster type resources for discovery to the CLI, SDKs and the SDM Terraform Provider: Kubernetes, KubernetesServiceAccount, AKS, AKSServiceAccount, AmazonEKS, AmazonEKSInstanceProfile, GoogleGKE.</p><p>The feature is not yet Generally Available and may not be available to your organization yet.</p></td></tr><tr><td>2024-06-17</td><td>Terraform Provider</td><td>10.4.0</td><td><p>This release adds the ability to configure the following cluster type resources for discovery to the CLI, SDKs and the SDM Terraform Provider: Kubernetes, KubernetesServiceAccount, AKS, AKSServiceAccount, AmazonEKS, AmazonEKSInstanceProfile, GoogleGKE.</p><p>The feature is not yet Generally Available and may not be available to your organization yet.</p></td></tr><tr><td>2024-06-17</td><td>Go SDK</td><td>9.4.0</td><td><p>This release adds the ability to configure the following cluster type resources for discovery to the CLI, SDKs and the SDM Terraform Provider: Kubernetes, KubernetesServiceAccount, AKS, AKSServiceAccount, AmazonEKS, AmazonEKSInstanceProfile, GoogleGKE.</p><p>The feature is not yet Generally Available and may not be available to your organization yet.</p></td></tr><tr><td>2024-06-17</td><td>Python SDK</td><td>9.4.0</td><td><p>This release adds the ability to configure the following cluster type resources for discovery to the CLI, SDKs and the SDM Terraform Provider: Kubernetes, KubernetesServiceAccount, AKS, AKSServiceAccount, AmazonEKS, AmazonEKSInstanceProfile, GoogleGKE.</p><p>The feature is not yet Generally Available and may not be available to your organization yet.</p></td></tr><tr><td>2024-06-17</td><td>Ruby SDK</td><td>9.4.0</td><td><p>This release adds the ability to configure the following cluster type resources for discovery to the CLI, SDKs and the SDM Terraform Provider: Kubernetes, KubernetesServiceAccount, AKS, AKSServiceAccount, AmazonEKS, AmazonEKSInstanceProfile, GoogleGKE.</p><p>The feature is not yet Generally Available and may not be available to your organization yet.</p></td></tr><tr><td>2024-06-17</td><td>Terraform Provider</td><td>10.3.0</td><td>This release changes the Remote Identity references to Identity Alias in the header and JSON keys for <code>sdm audit queries</code>, and for Log Sync.</td></tr><tr><td>2024-06-17</td><td>CLI</td><td>42.92.0</td><td>This release changes the Remote Identity references to Identity Alias in the header and JSON keys for <code>sdm audit queries</code>, and for Log Sync.</td></tr><tr><td>2024-06-17</td><td>Control Plane</td><td>89.1.0</td><td>This release changes the Remote Identity references to Identity Alias in the header and JSON keys for <code>sdm audit queries</code>, and for Log Sync.</td></tr><tr><td>2024-06-17</td><td>Python SDK</td><td>9.3.0</td><td>This release changes the Remote Identity references to Identity Alias in the header and JSON keys for <code>sdm audit queries</code>, and for Log Sync.</td></tr><tr><td>2024-06-17</td><td>Ruby SDK</td><td>9.3.0</td><td>This release changes the Remote Identity references to Identity Alias in the header and JSON keys for <code>sdm audit queries</code>, and for Log Sync.</td></tr><tr><td>2024-06-17</td><td>Go SDK</td><td>9.3.0</td><td>This release changes the Remote Identity references to Identity Alias in the header and JSON keys for <code>sdm audit queries</code>, and for Log Sync.</td></tr><tr><td>2024-06-17</td><td>CLI</td><td>42.90.0</td><td>This release renames the Remote Identity activities to Identity Alias and Identity Sets. This release also renames the <code>Remote Identities</code> header to <code>Identity Aliases</code> for <code>sdm audit users</code> and <code>sdm audit queries</code>.</td></tr><tr><td>2024-06-17</td><td>CLI</td><td>42.91.0</td><td>This release updates some CLI commands to now show the correct default value (instead of 0) for the <code>--page-limit</code> option.</td></tr><tr><td>2024-06-17</td><td>Control Plane</td><td>89.0.0</td><td>This release renames the Remote Identity activities to Identity Alias and Identity Sets. This release also renames the <code>Remote Identities</code> header to <code>Identity Aliases</code> for <code>sdm audit users</code> and <code>sdm audit queries</code>.</td></tr><tr><td>2024-06-17</td><td>Terraform Provider</td><td>10.2.0</td><td>This release renames the Remote Identity activities to Identity Alias and Identity Sets. This release also renames the <code>Remote Identities</code> header to <code>Identity Aliases</code> for <code>sdm audit users</code> and <code>sdm audit queries</code>.</td></tr><tr><td>2024-06-17</td><td>Python SDK</td><td>9.2.0</td><td>This release renames the Remote Identity activities to Identity Alias and Identity Sets. This release also renames the <code>Remote Identities</code> header to <code>Identity Aliases</code> for <code>sdm audit users</code> and <code>sdm audit queries</code>.</td></tr><tr><td>2024-06-17</td><td>Ruby SDK</td><td>9.2.0</td><td>This release renames the Remote Identity activities to Identity Alias and Identity Sets. This release also renames the <code>Remote Identities</code> header to <code>Identity Aliases</code> for <code>sdm audit users</code> and <code>sdm audit queries</code>.</td></tr><tr><td>2024-06-17</td><td>Go SDK</td><td>9.2.0</td><td>This release renames the Remote Identity activities to Identity Alias and Identity Sets. This release also renames the <code>Remote Identities</code> header to <code>Identity Aliases</code> for <code>sdm audit users</code> and <code>sdm audit queries</code>.</td></tr><tr><td>2024-06-14</td><td>CLI</td><td>42.81.0</td><td>This change causes nodes to restart if they detect they have lost their authentication state, so they can either restore it or sever themselves from the network and cut idle traffic if they cannot (because they were remotely deleted, for example).</td></tr><tr><td>2024-06-14</td><td>Control Plane</td><td>88.91.0</td><td>This release implements a default behavior to forbid self-approvals in the workflow settings. Existing configurations will be unaffected.</td></tr><tr><td>2024-06-13</td><td>Control Plane</td><td>88.85.0</td><td>This change resolves a bug where deleted nodes would not be notified of their deletion, causing them to continue to fruitlessly send requests to a StrongDM control plane until they were manually cut off.</td></tr><tr><td>2024-06-12</td><td>Control Plane</td><td>88.72.0</td><td>This release allows Resources to be filtered by <code>identityEnabled</code> and <code>identitySetID</code> "identityEnabled" has a Boolean value and indicates if a resource is configured to use an Identity Alias on connection. "identitySetID" has a string value, and is the specific Identity Set that the resource is configured to use. Filtering by <code>remoteIdentityEnabled</code> is still supported but is deprecated.</td></tr><tr><td>2024-06-11</td><td>CLI</td><td>42.69.0</td><td>This change reveals the sdm admin network subtree for working with peering groups.</td></tr><tr><td>2024-06-11</td><td>CLI</td><td>42.66.0</td><td>This release adds support for special JSON functions and the IS JSON clause to the SQL actions parser.</td></tr><tr><td>2024-06-11</td><td>Control Plane</td><td>88.68.0</td><td>This release adds support for special JSON functions and the IS JSON clause to the SQL actions parser.</td></tr><tr><td>2024-06-11</td><td>CLI</td><td>42.61.0</td><td>This changeset supports DROP DATABASE, DROP CAST, DROP TRANSFORM, and DROP OPERATOR CLASS in the PostgreSQL action parser.</td></tr><tr><td>2024-06-11</td><td>Control Plane</td><td>88.64.0</td><td>This changeset supports DROP DATABASE, DROP CAST, DROP TRANSFORM, and DROP OPERATOR CLASS in the PostgreSQL action parser.</td></tr><tr><td>2024-06-11</td><td>CLI</td><td>42.59.0</td><td>This changeset adds action parsing support for SQL MERGE statements.</td></tr><tr><td>2024-06-11</td><td>Control Plane</td><td>88.63.0</td><td>This changeset adds action parsing support for SQL MERGE statements.</td></tr><tr><td>2024-06-11</td><td>CLI</td><td>42.58.0</td><td>This change adds support for UESCAPE clauses in PostgreSQL query parsing.</td></tr><tr><td>2024-06-11</td><td>Control Plane</td><td>88.62.0</td><td>This change adds support for UESCAPE clauses in PostgreSQL query parsing.</td></tr><tr><td>2024-06-10</td><td>CLI</td><td>42.57.0</td><td>This release augments SQL parsing to correctly handle cases around type copying in function creation and some forms of type casting.</td></tr><tr><td>2024-06-10</td><td>Control Plane</td><td>88.57.0</td><td>This release augments SQL parsing to correctly handle cases around type copying in function creation and some forms of type casting.</td></tr><tr><td>2024-06-10</td><td>CLI</td><td>42.54.0</td><td>This release augments the Postgres policy action parser to understand more edge cases of the Postgres grammar.</td></tr><tr><td>2024-06-10</td><td>Control Plane</td><td>88.46.0</td><td>This release adds Microsoft Defender as a supported Device Trust provider.</td></tr><tr><td>2024-06-06</td><td>Control Plane</td><td>88.24.0</td><td>This release fixes a bug preventing configured Okta MFA settings from appearing in the Admin UI.</td></tr><tr><td>2024-06-06</td><td>Control Plane</td><td>88.23.0</td><td>This release updates the error message received when a user is not enrolled in Okta MFA, for clarity.</td></tr><tr><td>2024-06-05</td><td>Control Plane</td><td>88.22.0</td><td>This release changes the behavior of the 'default' Identity Set. New organizations will no longer have a 'default' Identity Set automatically created. 'default' Identity Sets will also be able to be deleted.</td></tr><tr><td>2024-06-03</td><td>Control Plane</td><td>88.4.0</td><td>SCIM requests can now include a list of identity aliases to be assigned to a user.</td></tr><tr><td>2024-06-03</td><td>Control Plane</td><td>88.3.0</td><td>This change deprecates some older forms of creating healthchecks. Specifically, when gateways come online after being offline for over 60 seconds, they would formerly enqueue a healthcheck for every resource at that time; this has been removed. In addition, legacy clients used a less efficient mechanism for healthchecking resources on <code>sdm connect</code>; this has been removed. All CLI versions released within the last year, or greater than 38.13.0, will see no change in behavior here. Newer clients will (still) efficiently healthcheck resources on <code>sdm connect</code>, for any unhealthy resource, and this in combination with manual checks, checks on resource updates, and periodic automatic checks will keep gaps from causing access problems. Switching to explicit routing is also recommended for users with large, complicated networks.</td></tr><tr><td>2024-05-29</td><td>CLI</td><td>42.34.0</td><td>This release adds the Identity Set Create, Update, and Delete commands to the CLI and SDKs. It also changes <code>sdm admin identities create</code> to take in a required <code>identity-set-id</code> or <code>identity-set-name</code>, instead of creating all Identity Aliases with the default Identity Set.</td></tr><tr><td>2024-05-29</td><td>Control Plane</td><td>87.78.0</td><td>This release adds the Identity Set Create, Update, and Delete commands to the CLI and SDKs. It also changes <code>sdm admin identities create</code> to take in a required <code>identity-set-id</code> or <code>identity-set-name</code>, instead of creating all Identity Aliases with the default Identity Set.</td></tr><tr><td>2024-05-29</td><td>Java SDK</td><td>9.1.0</td><td>This release adds the Identity Set Create, Update, and Delete commands to the CLI and SDKs. It also changes <code>sdm admin identities create</code> to take in a required <code>identity-set-id</code> or <code>identity-set-name</code>, instead of creating all Identity Aliases with the default Identity Set.</td></tr><tr><td>2024-05-29</td><td>Terraform Provider</td><td>10.1.0</td><td>This release adds the Identity Set Create, Update, and Delete commands to the CLI and SDKs. It also changes <code>sdm admin identities create</code> to take in a required <code>identity-set-id</code> or <code>identity-set-name</code>, instead of creating all Identity Aliases with the default Identity Set.</td></tr><tr><td>2024-05-29</td><td>Python SDK</td><td>9.1.0</td><td>This release adds the Identity Set Create, Update, and Delete commands to the CLI and SDKs. It also changes <code>sdm admin identities create</code> to take in a required <code>identity-set-id</code> or <code>identity-set-name</code>, instead of creating all Identity Aliases with the default Identity Set.</td></tr><tr><td>2024-05-29</td><td>Go SDK</td><td>9.1.0</td><td>This release adds the Identity Set Create, Update, and Delete commands to the CLI and SDKs. It also changes <code>sdm admin identities create</code> to take in a required <code>identity-set-id</code> or <code>identity-set-name</code>, instead of creating all Identity Aliases with the default Identity Set.</td></tr><tr><td>2024-05-29</td><td>Ruby SDK</td><td>9.1.0</td><td>This release adds the Identity Set Create, Update, and Delete commands to the CLI and SDKs. It also changes <code>sdm admin identities create</code> to take in a required <code>identity-set-id</code> or <code>identity-set-name</code>, instead of creating all Identity Aliases with the default Identity Set.</td></tr><tr><td>2024-05-29</td><td>Control Plane</td><td>87.74.0</td><td>This release addresses a race condition in native login that could cause the user to be redirected to the login page when they should not be.</td></tr><tr><td>2024-05-22</td><td>CLI</td><td>42.26.0</td><td><p>This release renames <code>sdm admin remote-identities</code> to <code>sdm admin identities</code>, the <code>sdm admin remote-identities</code> tree is deprecated.</p><p>Similarly for SDKs, the old Remote Identity and Remote Identity Group surfaces have been deprecated and renamed to Identity Alias and Identity Set.</p><p>For Drivers, the <code>RemoteIdentityHealthcheckUsername</code> and <code>RemoteIdentityGroupId</code> have been renamed to <code>IdentityAliasHealthcheckUsername</code> and <code>IdentitySetId</code>.</p><p>When creating resources using the CLI, the user would need to use <code>identityAliasHealthcheckUsername</code> and <code>identitySetId</code>, instead of <code>remoteIdentityHealthcheckUsername</code> and <code>remoteIdentityGroupId</code> as the JSON keys.</p></td></tr><tr><td>2024-05-22</td><td>Control Plane</td><td>87.53.0</td><td><p>This release renames <code>sdm admin remote-identities</code> to <code>sdm admin identities</code>, the <code>sdm admin remote-identities</code> tree is deprecated.</p><p>Similarly for SDKs, the old Remote Identity and Remote Identity Group surfaces have been deprecated and renamed to Identity Alias and Identity Set.</p><p>For Drivers, the <code>RemoteIdentityHealthcheckUsername</code> and <code>RemoteIdentityGroupId</code> have been renamed to <code>IdentityAliasHealthcheckUsername</code> and <code>IdentitySetId</code>.</p><p>When creating resources using the CLI, the user would need to use <code>identityAliasHealthcheckUsername</code> and <code>identitySetId</code>, instead of <code>remoteIdentityHealthcheckUsername</code> and <code>remoteIdentityGroupId</code> as the JSON keys.</p></td></tr><tr><td>2024-05-22</td><td>Java SDK</td><td>9.0.0</td><td><p>This release renames <code>sdm admin remote-identities</code> to <code>sdm admin identities</code>, the <code>sdm admin remote-identities</code> tree is deprecated.</p><p>Similarly for SDKs, the old Remote Identity and Remote Identity Group surfaces have been deprecated and renamed to Identity Alias and Identity Set.</p><p>For Drivers, the <code>RemoteIdentityHealthcheckUsername</code> and <code>RemoteIdentityGroupId</code> have been renamed to <code>IdentityAliasHealthcheckUsername</code> and <code>IdentitySetId</code>.</p><p>When creating resources using the CLI, the user would need to use <code>identityAliasHealthcheckUsername</code> and <code>identitySetId</code>, instead of <code>remoteIdentityHealthcheckUsername</code> and <code>remoteIdentityGroupId</code> as the JSON keys.</p></td></tr><tr><td>2024-05-22</td><td>Terraform Provider</td><td>10.0.0</td><td><p>This release renames <code>sdm admin remote-identities</code> to <code>sdm admin identities</code>, the <code>sdm admin remote-identities</code> tree is deprecated.</p><p>Similarly for SDKs, the old Remote Identity and Remote Identity Group surfaces have been deprecated and renamed to Identity Alias and Identity Set.</p><p>For Drivers, the <code>RemoteIdentityHealthcheckUsername</code> and <code>RemoteIdentityGroupId</code> have been renamed to <code>IdentityAliasHealthcheckUsername</code> and <code>IdentitySetId</code>.</p><p>When creating resources using the CLI, the user would need to use <code>identityAliasHealthcheckUsername</code> and <code>identitySetId</code>, instead of <code>remoteIdentityHealthcheckUsername</code> and <code>remoteIdentityGroupId</code> as the JSON keys.</p></td></tr><tr><td>2024-05-22</td><td>Python SDK</td><td>9.0.0</td><td><p>This release renames <code>sdm admin remote-identities</code> to <code>sdm admin identities</code>, the <code>sdm admin remote-identities</code> tree is deprecated.</p><p>Similarly for SDKs, the old Remote Identity and Remote Identity Group surfaces have been deprecated and renamed to Identity Alias and Identity Set.</p><p>For Drivers, the <code>RemoteIdentityHealthcheckUsername</code> and <code>RemoteIdentityGroupId</code> have been renamed to <code>IdentityAliasHealthcheckUsername</code> and <code>IdentitySetId</code>.</p><p>When creating resources using the CLI, the user would need to use <code>identityAliasHealthcheckUsername</code> and <code>identitySetId</code>, instead of <code>remoteIdentityHealthcheckUsername</code> and <code>remoteIdentityGroupId</code> as the JSON keys.</p></td></tr><tr><td>2024-05-22</td><td>Ruby SDK</td><td>9.0.0</td><td><p>This release renames <code>sdm admin remote-identities</code> to <code>sdm admin identities</code>, the <code>sdm admin remote-identities</code> tree is deprecated.</p><p>Similarly for SDKs, the old Remote Identity and Remote Identity Group surfaces have been deprecated and renamed to Identity Alias and Identity Set.</p><p>For Drivers, the <code>RemoteIdentityHealthcheckUsername</code> and <code>RemoteIdentityGroupId</code> have been renamed to <code>IdentityAliasHealthcheckUsername</code> and <code>IdentitySetId</code>.</p><p>When creating resources using the CLI, the user would need to use <code>identityAliasHealthcheckUsername</code> and <code>identitySetId</code>, instead of <code>remoteIdentityHealthcheckUsername</code> and <code>remoteIdentityGroupId</code> as the JSON keys.</p></td></tr><tr><td>2024-05-22</td><td>Go SDK</td><td>9.0.0</td><td><p>This release renames <code>sdm admin remote-identities</code> to <code>sdm admin identities</code>, the <code>sdm admin remote-identities</code> tree is deprecated.</p><p>Similarly for SDKs, the old Remote Identity and Remote Identity Group surfaces have been deprecated and renamed to Identity Alias and Identity Set.</p><p>For Drivers, the <code>RemoteIdentityHealthcheckUsername</code> and <code>RemoteIdentityGroupId</code> have been renamed to <code>IdentityAliasHealthcheckUsername</code> and <code>IdentitySetId</code>.</p><p>When creating resources using the CLI, the user would need to use <code>identityAliasHealthcheckUsername</code> and <code>identitySetId</code>, instead of <code>remoteIdentityHealthcheckUsername</code> and <code>remoteIdentityGroupId</code> as the JSON keys.</p></td></tr><tr><td>2024-05-20</td><td>Java SDK</td><td>8.4.0</td><td>Added support for Hashicorp Vault AWS IAM and EC2 authentication methods for use as a secret store.</td></tr><tr><td>2024-05-20</td><td>Python SDK</td><td>8.4.0</td><td>Added support for Hashicorp Vault AWS IAM and EC2 authentication methods for use as a secret store.</td></tr><tr><td>2024-05-20</td><td>Go SDK</td><td>8.4.0</td><td>Added support for Hashicorp Vault AWS IAM and EC2 authentication methods for use as a secret store.</td></tr><tr><td>2024-05-20</td><td>Ruby SDK</td><td>8.4.0</td><td>Added support for Hashicorp Vault AWS IAM and EC2 authentication methods for use as a secret store.</td></tr><tr><td>2024-05-20</td><td>Desktop Application</td><td>21.71.0</td><td>Added support for Hashicorp Vault AWS IAM and EC2 authentication methods for use as a secret store.</td></tr><tr><td>2024-05-20</td><td>CLI</td><td>42.25.0</td><td>Added support for Hashicorp Vault AWS IAM and EC2 authentication methods for use as a secret store.</td></tr><tr><td>2024-05-20</td><td>Control Plane</td><td>87.49.0</td><td>Added support for Hashicorp Vault AWS IAM and EC2 authentication methods for use as a secret store.</td></tr><tr><td>2024-05-17</td><td>Control Plane</td><td>87.44.0</td><td>This release updates the display and visibility of the Log Stream Admin UI component based on payment tier.</td></tr><tr><td>2024-05-16</td><td>Control Plane</td><td>87.32.0</td><td>When using the Context-Based Policy feature, the default "Global Access" policy shown in the Policy Library in the Admin UI can now be modified or deleted. Modifying or deleting this policy may prevent users with pre-assigned role or temporary account grants from accessing resources, as access to resources must be permitted by both grants and by policy. In addition, when using the Context-Based Policy feature, the policy editor in the Admin UI can now be used to create permit policies without specifying a location, device trust, or user requirements. Such policies can be used to permit access to resources in conjunction with existing role and account grants.</td></tr><tr><td>2024-05-16</td><td>Control Plane</td><td>87.30.0</td><td>This release fixes an issue where queries logged for context-based policy were not populating the source and client IP address fields in the query. The source and client IP address information was still present in the authorization data included with the logged query.</td></tr><tr><td>2024-05-15</td><td>Control Plane</td><td>87.25.0</td><td>This release fixes a bug where SCIM token rotation would not present a new token to copy.</td></tr><tr><td>2024-05-13</td><td>Control Plane</td><td>87.13.0</td><td>This release fixes a bug related to opening <code>app.strongdm.com</code> from the desktop app and fixes a bug related to SSO logins.</td></tr><tr><td>2024-05-13</td><td>CLI</td><td>42.9.0</td><td><code>sdm install</code> now supports the <code>--domain</code> flag, which allows you to instruct the client or relay to connect to a StrongDM control plane other than <code>strongdm.com</code>. For example, customers using GovCloud should connect to <code>strongdm-gov.com</code>.</td></tr><tr><td>2024-05-13</td><td>Control Plane</td><td>87.8.0</td><td><p>This release adds the ability to reference Identity Aliases and Identity Sets in the context of policies. It also adds Identity Set as an entity (that is, <code>StrongDM::IdentitySet</code>).</p><p>Example usage: <code>&#x26;#xA;@justify(&#x26;#34;Please provide justification&#x26;#34;)&#x26;#xA;permit (&#x26;#xA; principal,&#x26;#xA; action in [StrongDM::Action::&#x26;#34;dial&#x26;#34;],&#x26;#xA; resource == StrongDM::Resource::&#x26;#34;rs-25599cd76579dac5&#x26;#34;&#x26;#xA;) when {&#x26;#xA; context.identityAlias.username == &#x26;#34;ssh_superuser&#x26;#34; &#x26;amp;&#x26;amp; &#x26;#xA; context.identitySet == StrongDM::IdentitySet::&#x26;#34;is-111111111111&#x26;#34;&#x26;#xA;};&#x26;#xA;</code></p></td></tr><tr><td>2024-05-09</td><td>Control Plane</td><td>86.98.0</td><td>Added support for a new certificate authority integration: Keyfactor EJBCA SSH CA</td></tr><tr><td>2024-05-09</td><td>Java SDK</td><td>8.3.0</td><td>Added support for a new certificate authority integration: Keyfactor EJBCA SSH CA</td></tr><tr><td>2024-05-09</td><td>Terraform Provider</td><td>9.3.0</td><td>Added support for a new certificate authority integration: Keyfactor EJBCA SSH CA</td></tr><tr><td>2024-05-09</td><td>Ruby SDK</td><td>8.3.0</td><td>Added support for a new certificate authority integration: Keyfactor EJBCA SSH CA</td></tr><tr><td>2024-05-09</td><td>Python SDK</td><td>8.3.0</td><td>Added support for a new certificate authority integration: Keyfactor EJBCA SSH CA</td></tr><tr><td>2024-05-09</td><td>Go SDK</td><td>8.3.0</td><td>Added support for a new certificate authority integration: Keyfactor EJBCA SSH CA</td></tr><tr><td>2024-05-09</td><td>CLI</td><td>42.4.0</td><td>This release addresses the following third party CVEs: CVE-2024-28180</td></tr><tr><td>2024-05-09</td><td>Control Plane</td><td>86.97.0</td><td>This release addresses the following third party CVEs: CVE-2024-28180</td></tr><tr><td>2024-05-08</td><td>Control Plane</td><td>86.91.0</td><td>This release resolves a bug where timed out Admin UI sessions would not redirect users back to the login screen.</td></tr><tr><td>2024-05-08</td><td>CLI</td><td>41.98.0</td><td>This release removes the client key password environment variable field for configuration of Keyfactor RDP CAs.</td></tr><tr><td>2024-05-08</td><td>Control Plane</td><td>86.86.0</td><td>This release removes the client key password environment variable field for configuration of Keyfactor RDP CAs.</td></tr><tr><td>2024-05-06</td><td>Control Plane</td><td>86.79.0</td><td>This release adds a page in the Admin UI that informs users that they are logging out prior to showing the login screen.</td></tr><tr><td>2024-05-06</td><td>Control Plane</td><td>86.76.0</td><td>This release addresses the following third party CVEs: CVE-2024-33883</td></tr><tr><td>2024-05-06</td><td>CLI</td><td>41.94.0</td><td>This release changes the Request Access form in the integration for Slack so that the duration component now allows times that are less than 1 hour.</td></tr><tr><td>2024-05-06</td><td>Control Plane</td><td>86.75.0</td><td>This release changes the Request Access form in the integration for Slack so that the duration component now allows times that are less than 1 hour.</td></tr><tr><td>2024-05-02</td><td>Control Plane</td><td>86.64.0</td><td>This release fixes a bug in the rendering of the query panel for policy logs, where it would take some time to fill the screen on large displays.</td></tr><tr><td>2024-05-02</td><td>Control Plane</td><td>86.62.0</td><td>Fixes a bug in integration with Slack where non-approvers could mark channel-based request as approved, which would result in no actual access to the resource since they are not approvers.</td></tr><tr><td>2024-04-30</td><td>Control Plane</td><td>86.55.0</td><td>This release fixes a bug in the rendering of routes via <code>sdm admin network topology</code>.</td></tr><tr><td>2024-04-30</td><td>CLI</td><td>41.82.0</td><td>The FIPS-compliant variant of our linux CLI binary is now compatible with glibc versions as old as 2.27. This does not affect normal, non-FIPS-compliant linux binaries.</td></tr><tr><td>2024-04-30</td><td>Control Plane</td><td>86.48.0</td><td>The Download &#x26; Install page on the Admin UI now directs Docker users to <code>public.ecr.aws/strongdm</code> instead of <code>quay.io/sdmrepo</code>. quay.io will continue to be supported.</td></tr><tr><td>2024-04-25</td><td>Java SDK</td><td>8.1.0</td><td>This release adds support for the Keyfactor EJBCA Certificate authority type.</td></tr><tr><td>2024-04-25</td><td>Terraform Provider</td><td>9.1.0</td><td>This release adds support for the Keyfactor EJBCA Certificate authority type.</td></tr><tr><td>2024-04-25</td><td>Python SDK</td><td>8.1.0</td><td>This release adds support for the Keyfactor EJBCA Certificate authority type.</td></tr><tr><td>2024-04-25</td><td>Go SDK</td><td>8.1.0</td><td>This release adds support for the Keyfactor EJBCA Certificate authority type.</td></tr><tr><td>2024-04-25</td><td>Ruby SDK</td><td>8.1.0</td><td>This release adds support for the Keyfactor EJBCA Certificate authority type.</td></tr><tr><td>2024-04-23</td><td>CLI</td><td>41.70.0</td><td>This release addresses the following third party CVEs: CVE-2023-45288</td></tr><tr><td>2024-04-23</td><td>Control Plane</td><td>86.25.0</td><td>This release addresses the following third party CVEs: CVE-2023-45288</td></tr><tr><td>2024-04-23</td><td>Control Plane</td><td>86.23.0</td><td>This release adds the Remote Identity group ID (i.e. <code>ig-123</code>) field to the resource filters.</td></tr><tr><td>2024-04-23</td><td>CLI</td><td>41.67.0</td><td>This release adds support for a new third party certificate authority: Keyfactor for RDP.</td></tr><tr><td>2024-04-23</td><td>Control Plane</td><td>86.22.0</td><td>This release adds support for a new third party certificate authority: Keyfactor for RDP.</td></tr><tr><td>2024-04-23</td><td>Desktop Application</td><td>21.69.0</td><td>This release updates the installers to provide better support for managed installations where the SDM user may be a standard user, not an administrator. To allow auto-updates to work without requiring an administrator, the SDM application is now installed by default into the user's program directory (<code>$HOME/Applications</code> on macOS and <code>$PROFILE/AppData/Local/Programs</code> on Windows). The Windows and macOS installers both provide a way for an administrator to install the application on behalf of a standard user and both install the latest StrongDM System Service when the installation is performed with administrator privileges.</td></tr><tr><td>2024-04-22</td><td>CLI</td><td>41.64.0</td><td>This release enhances proxied HTTP requests for website resources to now include the X-Forwarded-Proto header indicating the protocol scheme (HTTP or HTTPS). Some HTTP servers may relay on this header being present.</td></tr><tr><td>2024-04-22</td><td>CLI</td><td>41.63.0</td><td>This release enables the ability to refer to a resource by name when requesting access via the CLI (<code>sdm access to &#x26;lt;resource name&#x26;gt;</code>). This release also fixes a bug where the requested resource IDs would not populate in the <code>sdm access requests</code> command.</td></tr><tr><td>2024-04-22</td><td>Control Plane</td><td>86.20.0</td><td>This release enables the ability to refer to a resource by name when requesting access via the CLI (<code>sdm access to &#x26;lt;resource name&#x26;gt;</code>). This release also fixes a bug where the requested resource IDs would not populate in the <code>sdm access requests</code> command.</td></tr><tr><td>2024-04-22</td><td>CLI</td><td>41.62.0</td><td>This release augments logging for the Snowsight driver to include any UUIDs that are found in responses when connection attempts fail. Snowsight documentation indicates that these may be used to query the LOGIN_HISTORY or LOGIN_HISTORY_BY_USER views to get more details about the error.</td></tr><tr><td>2024-04-22</td><td>Control Plane</td><td>86.17.0</td><td>This release augments logging for the Snowsight driver to include any UUIDs that are found in responses when connection attempts fail. Snowsight documentation indicates that these may be used to query the LOGIN_HISTORY or LOGIN_HISTORY_BY_USER views to get more details about the error.</td></tr><tr><td>2024-04-18</td><td>Control Plane</td><td>86.5.0</td><td>This release addresses the following third party CVEs: CVE-2024-29041,CVE-2024-28863</td></tr><tr><td>2024-04-17</td><td>Control Plane</td><td>86.2.0</td><td>This release fixes a bug that caused the minimum CrowdStrike score not to appear correctly in the Admin UI.</td></tr><tr><td>2024-04-15</td><td>CLI</td><td>41.52.0</td><td>This release fixes a bug with context-based policy where justification and MFA prompts may no longer appear through the desktop app when logging back in to the client after a log out or session expiration.</td></tr><tr><td>2024-04-15</td><td>Control Plane</td><td>85.95.0</td><td>This release fixes a bug with context-based policy where justification and MFA prompts may no longer appear through the desktop app when logging back in to the client after a log out or session expiration.</td></tr><tr><td>2024-04-12</td><td>Terraform Provider</td><td>9.0.0</td><td>This release adds the ability to query tokens on the <code>sdm_account</code> resource type in the StrongDM Terraform provider.</td></tr><tr><td>2024-04-09</td><td>Control Plane</td><td>85.88.0</td><td>This release refactors Slack token refreshes to be more tolerant of Slack outages.</td></tr><tr><td>2024-04-09</td><td>Control Plane</td><td>85.87.0</td><td><p>This release includes the following changes:</p><ul><li>Write operations are limited to Create and Delete operations for API keys and tokens. Furthermore, Update is valid for changing the name of these token types, but no other fields are allowed to be updated.</li><li>Read operations support all token types (API Key, Admin Token, SCIM Token, and ServiceNow Tokens) in addition to the existing users and service account types. Note that the default behavior of the List operation on all accounts without any filters on account type will now return token types in addition to the users and service account types.</li><li>API keys and admin tokens now can be attached with permissions to create new tokens. The permissions on the tokens created must be a subset of the permissions that the parent token has.</li></ul></td></tr><tr><td>2024-04-09</td><td>Java SDK</td><td>8.0.0</td><td><p>This release includes the following changes:</p><ul><li>Write operations are limited to Create and Delete operations for API keys and tokens. Furthermore, Update is valid for changing the name of these token types, but no other fields are allowed to be updated.</li><li>Read operations support all token types (API Key, Admin Token, SCIM Token, and ServiceNow Tokens) in addition to the existing users and service account types. Note that the default behavior of the List operation on all accounts without any filters on account type will now return token types in addition to the users and service account types.</li><li>API keys and admin tokens now can be attached with permissions to create new tokens. The permissions on the tokens created must be a subset of the permissions that the parent token has.</li></ul></td></tr><tr><td>2024-04-09</td><td>Python SDK</td><td>8.0.0</td><td><p>This release includes the following changes:</p><ul><li>Write operations are limited to Create and Delete operations for API keys and tokens. Furthermore, Update is valid for changing the name of these token types, but no other fields are allowed to be updated.</li><li>Read operations support all token types (API Key, Admin Token, SCIM Token, and ServiceNow Tokens) in addition to the existing users and service account types. Note that the default behavior of the List operation on all accounts without any filters on account type will now return token types in addition to the users and service account types.</li><li>API keys and admin tokens now can be attached with permissions to create new tokens. The permissions on the tokens created must be a subset of the permissions that the parent token has.</li></ul></td></tr><tr><td>2024-04-09</td><td>Ruby SDK</td><td>8.0.0</td><td><p>This release includes the following changes:</p><ul><li>Write operations are limited to Create and Delete operations for API keys and tokens. Furthermore, Update is valid for changing the name of these token types, but no other fields are allowed to be updated.</li><li>Read operations support all token types (API Key, Admin Token, SCIM Token, and ServiceNow Tokens) in addition to the existing users and service account types. Note that the default behavior of the List operation on all accounts without any filters on account type will now return token types in addition to the users and service account types.</li><li>API keys and admin tokens now can be attached with permissions to create new tokens. The permissions on the tokens created must be a subset of the permissions that the parent token has.</li></ul></td></tr><tr><td>2024-04-09</td><td>Go SDK</td><td>8.0.0</td><td><p>This release includes the following changes:</p><ul><li>Write operations are limited to Create and Delete operations for API keys and tokens. Furthermore, Update is valid for changing the name of these token types, but no other fields are allowed to be updated.</li><li>Read operations support all token types (API Key, Admin Token, SCIM Token, and ServiceNow Tokens) in addition to the existing users and service account types. Note that the default behavior of the List operation on all accounts without any filters on account type will now return token types in addition to the users and service account types.</li><li>API keys and admin tokens now can be attached with permissions to create new tokens. The permissions on the tokens created must be a subset of the permissions that the parent token has.</li></ul></td></tr><tr><td>2024-04-09</td><td>Control Plane</td><td>85.86.0</td><td>This release fixes a regression where user agents weren't being populated for requests originating from Slack requests or anonymous HTTP requests.</td></tr><tr><td>2024-04-02</td><td>Desktop Application</td><td>21.65.0</td><td>This release fixes a bug where failing MFA during login would require quitting the application to re-attempt login.</td></tr><tr><td>2024-03-26</td><td>Control Plane</td><td>85.70.0</td><td>This release fixes some broken documentation links in the Admin UI.</td></tr><tr><td>2024-03-26</td><td>Control Plane</td><td>85.68.0</td><td>This release fixes a bug where retrieving large replays through the API could fail with a resource exhausted error due to exceeding maximum GRPC message size limits.</td></tr><tr><td>2024-03-26</td><td>Python SDK</td><td>7.1.1</td><td>This release fixes a bug where retrieving large replays through the API could fail with a resource exhausted error due to exceeding maximum GRPC message size limits.</td></tr><tr><td>2024-03-25</td><td>Control Plane</td><td>85.64.0</td><td>This release adds a new Default Service Account Enforcement setting in the Admin UI Device Trust security settings in the Settings > Security page and a matching Service Account level setting in the Access > Users > Service Account > Settings page. The new settings allow for setting the default Device Trust enforcement policy for service accounts to be either required or exempt at the organization level, and also to set an overriding setting on individual service accounts. The effective Device Trust state is now shown for service accounts on the Access > Users page in the Device Trust column.</td></tr><tr><td>2024-03-21</td><td>Control Plane</td><td>85.63.0</td><td>This release fixes an issue that could cause a manual approval flow to be converted to an automatic one that would fail to save.</td></tr><tr><td>2024-03-21</td><td>Control Plane</td><td>85.62.0</td><td>This release fixes an issue where automatic approval workflows couldn't be saved unless an approver was selected.</td></tr><tr><td>2024-03-21</td><td>Control Plane</td><td>85.61.0</td><td>This release reduces the number of error emails that may be sent due to Device Trust provider issues. In addition, a "resolved" email will now be sent when the issue is no longer present.</td></tr><tr><td>2024-03-19</td><td>Control Plane</td><td>85.59.0</td><td>This release fixes an issue where only the first 25 Approval Workflows would list in the Admin UI.</td></tr><tr><td>2024-03-19</td><td>Control Plane</td><td>85.58.0</td><td>This release fixes an issue where the MFA screen did not take up the whole screen in the desktop app.</td></tr><tr><td>2024-03-19</td><td>Control Plane</td><td>85.56.0</td><td><p><a href="https://www.strongdm.com/docs/admin/certificate-authorities/third-party-ca/">Third Party Certificate Authorities</a> are generally available, including AWS Private CA RDP, Active Directory Certificate Services, GCP Certificate Authority Service RDP, HashiCorp Vault SSH, HashiCorp Vault SSH (AppRole), HashiCorp Vault SSH (Token), HashiCorp Vault RDP, HashiCorp Vault RDP (AppRole), HashiCorp Vault RDP (Token)</p><p>Each third party Certificate Authority has a details page which includes Diagnostics, Settings, and Resources (if resources have been applied).</p></td></tr><tr><td>2024-03-19</td><td>Control Plane</td><td>85.55.0</td><td>If an access request is automatically denied due to there being no approvers on the bound workflow a reason is added to indicate why the request was denied.</td></tr><tr><td>2024-03-18</td><td>Control Plane</td><td>85.53.0</td><td>This release fixes an issue where the IP Allowlist settings page could not be accessed even with the feature enabled.</td></tr><tr><td>2024-03-18</td><td>Desktop Application</td><td>21.64.0</td><td><p>The installer for Windows (EXE file) and macOS (PKG file) have been changed.</p><p>When the installer is run by a privileged user (run as Administrator on Windows; with sudo or as root on macOS), the installation also includes a virtual networking component.</p><p>The installer now provides a way for an administrator to install the application for the use of specified standard user that makes auto-updates work properly for that end user. To do this on Windows, run the installer as Administrator with an extra <code>--SDMUSER=&#x26;lt;OtherUserName&#x26;gt;</code> on the command line. On MacOS, run the command <code>HOME=/Users/&#x26;lt;OtherUserName&#x26;gt; sudo installer -pkg &#x26;lt;SDMInstaller.pkg&#x26;gt; -target /</code>.</p><p>Standard (non-admin) users can still run the installer. When executed without admin, the installer acts as it did before. It installs the SDM application to a per-user location and does not install the virtual networking component.</p></td></tr><tr><td>2024-03-15</td><td>CLI</td><td>41.34.0</td><td>This release fixes an issue with AWS resources where where retrieving objects through S3 with certain special characters in the object key could fail with a signature error.</td></tr><tr><td>2024-03-15</td><td>Desktop Application</td><td>21.63.0</td><td>This release addresses the following third party CVEs: CVE-2024-24786,CVE-2024-27303</td></tr><tr><td>2024-03-15</td><td>CLI</td><td>41.33.0</td><td>This release addresses the following third party CVEs: CVE-2024-24786,CVE-2024-27303</td></tr><tr><td>2024-03-15</td><td>Control Plane</td><td>85.49.0</td><td>This release addresses the following third party CVEs: CVE-2024-24786,CVE-2024-27303</td></tr><tr><td>2024-03-15</td><td>CLI</td><td>41.32.0</td><td><p>This release adds the Issued Certificate TTL Minutes field, as a required field, to the Certificate Authorities configurations for AWS Private CA, Google Certificate Authority Service and HashiCorp Vault SSH and PKI. This field allows for the specification of the lifetime of the requested certificate.</p><p>This release also marks the Certificate Authority category Secret Stores as stable.</p></td></tr><tr><td>2024-03-15</td><td>Control Plane</td><td>85.48.0</td><td><p>This release adds the Issued Certificate TTL Minutes field, as a required field, to the Certificate Authorities configurations for AWS Private CA, Google Certificate Authority Service and HashiCorp Vault SSH and PKI. This field allows for the specification of the lifetime of the requested certificate.</p><p>This release also marks the Certificate Authority category Secret Stores as stable.</p></td></tr><tr><td>2024-03-15</td><td>Java SDK</td><td>7.1.0</td><td><p>This release adds the Issued Certificate TTL Minutes field, as a required field, to the Certificate Authorities configurations for AWS Private CA, Google Certificate Authority Service and HashiCorp Vault SSH and PKI. This field allows for the specification of the lifetime of the requested certificate.</p><p>This release also marks the Certificate Authority category Secret Stores as stable.</p></td></tr><tr><td>2024-03-15</td><td>Terraform Provider</td><td>8.1.0</td><td><p>This release adds the Issued Certificate TTL Minutes field, as a required field, to the Certificate Authorities configurations for AWS Private CA, Google Certificate Authority Service and HashiCorp Vault SSH and PKI. This field allows for the specification of the lifetime of the requested certificate.</p><p>This release also marks the Certificate Authority category Secret Stores as stable.</p></td></tr><tr><td>2024-03-15</td><td>Python SDK</td><td>7.1.0</td><td><p>This release adds the Issued Certificate TTL Minutes field, as a required field, to the Certificate Authorities configurations for AWS Private CA, Google Certificate Authority Service and HashiCorp Vault SSH and PKI. This field allows for the specification of the lifetime of the requested certificate.</p><p>This release also marks the Certificate Authority category Secret Stores as stable.</p></td></tr><tr><td>2024-03-15</td><td>Ruby SDK</td><td>7.1.0</td><td><p>This release adds the Issued Certificate TTL Minutes field, as a required field, to the Certificate Authorities configurations for AWS Private CA, Google Certificate Authority Service and HashiCorp Vault SSH and PKI. This field allows for the specification of the lifetime of the requested certificate.</p><p>This release also marks the Certificate Authority category Secret Stores as stable.</p></td></tr><tr><td>2024-03-15</td><td>Go SDK</td><td>7.1.0</td><td><p>This release adds the Issued Certificate TTL Minutes field, as a required field, to the Certificate Authorities configurations for AWS Private CA, Google Certificate Authority Service and HashiCorp Vault SSH and PKI. This field allows for the specification of the lifetime of the requested certificate.</p><p>This release also marks the Certificate Authority category Secret Stores as stable.</p></td></tr><tr><td>2024-03-15</td><td>CLI</td><td>41.31.0</td><td>This release adds the ability to modify user permission levels via the SDKs.</td></tr><tr><td>2024-03-15</td><td>Control Plane</td><td>85.46.0</td><td>This release adds the ability to modify user permission levels via the SDKs.</td></tr><tr><td>2024-03-15</td><td>Terraform Provider</td><td>8.0.0</td><td>This release adds the ability to modify user permission levels via the SDKs.</td></tr><tr><td>2024-03-15</td><td>Java SDK</td><td>7.0.0</td><td>This release adds the ability to modify user permission levels via the SDKs.</td></tr><tr><td>2024-03-15</td><td>Python SDK</td><td>7.0.0</td><td>This release adds the ability to modify user permission levels via the SDKs.</td></tr><tr><td>2024-03-15</td><td>Go SDK</td><td>7.0.0</td><td>This release adds the ability to modify user permission levels via the SDKs.</td></tr><tr><td>2024-03-15</td><td>Ruby SDK</td><td>7.0.0</td><td>This release adds the ability to modify user permission levels via the SDKs.</td></tr><tr><td>2024-03-15</td><td>Control Plane</td><td>85.43.0</td><td>This release replaces Support chat links during organization trials with documentation links.</td></tr><tr><td>2024-03-14</td><td>Control Plane</td><td>85.39.0</td><td>This release changes the Admin UI Access Workflows page's table header checkbox to show an indeterminate state when some but not all rows have been selected.</td></tr><tr><td>2024-03-12</td><td>Control Plane</td><td>85.35.0</td><td>This release makes approval workflows unable to be saved unless an approver is selected.</td></tr><tr><td>2024-03-12</td><td>Control Plane</td><td>85.33.0</td><td>This release updates the Device Trust settings in the Admin UI with more flexible controls globally and per user.</td></tr><tr><td>2024-03-08</td><td>CLI</td><td>41.26.0</td><td>This release sets the TTL for issued certificates using certain third-party CAs to a lower default TTL of 5 minutes.</td></tr><tr><td>2024-03-08</td><td>Control Plane</td><td>85.24.0</td><td>This release makes new <a href="https://www.strongdm.com/docs/admin/policies/">Policy</a> features available to Enterprise customers in the Admin UI. These features allow admins to require MFA or text justifications or to require approval workflows to be followed for some access. Policies can consider conditions such as the geographic location of the user and the device trust score of the user's machine when making access decisions.</td></tr><tr><td>2024-03-08</td><td>CLI</td><td>41.25.0</td><td>This change hides the <code>account</code> field returned by <code>sdm ready</code> by default, replacing it with <code>account_info</code>, a new object containing more specific information about the logged in account. This also adds the -v or verbose flag to <code>sdm ready</code> which restores this deprecated field temporarily, and adds additional fields as well.</td></tr><tr><td>2024-03-07</td><td>Control Plane</td><td>85.21.0</td><td>This release fixes a bug where access workflows did not save when unlinking a manual approval flow.</td></tr><tr><td>2024-03-07</td><td>Control Plane</td><td>85.19.0</td><td>In this release, the default value of the Access filter in the Access Catalog has been changed from "Any" to "Available", so that the default results will now be restricted to resources that are currently available for the user to request.</td></tr><tr><td>2024-03-06</td><td>Control Plane</td><td>85.18.0</td><td>This release modifies the presentation of user and global settings for device trust in the Admin UI.</td></tr><tr><td>2024-03-05</td><td>Control Plane</td><td>85.15.0</td><td>This adds an Access component to the Catalog Search form in the Slack app. The default value for the Access filter is still "Available", but users now have the option to change it.</td></tr><tr><td>2024-03-04</td><td>Control Plane</td><td>85.10.0</td><td>This release adds Approval Workflows permissions and Approval Workflows audit permissions for API token creation and admin token creation.</td></tr><tr><td>2024-03-04</td><td>Terraform Provider</td><td>7.7.0</td><td>This release adds support for managing approval workflows. Using the SDKs/CLI, users can now Create, Update, List, Get, and Delete approval workflows. Users can also Create, List, Get, and Delete approval workflow steps and approval workflow approvers.</td></tr><tr><td>2024-03-04</td><td>Ruby SDK</td><td>6.9.0</td><td>This release adds support for managing approval workflows. Using the SDKs/CLI, users can now Create, Update, List, Get, and Delete approval workflows. Users can also Create, List, Get, and Delete approval workflow steps and approval workflow approvers.</td></tr><tr><td>2024-03-04</td><td>Python SDK</td><td>6.9.0</td><td>This release adds support for managing approval workflows. Using the SDKs/CLI, users can now Create, Update, List, Get, and Delete approval workflows. Users can also Create, List, Get, and Delete approval workflow steps and approval workflow approvers.</td></tr><tr><td>2024-03-04</td><td>Java SDK</td><td>6.9.0</td><td>This release adds support for managing approval workflows. Using the SDKs/CLI, users can now Create, Update, List, Get, and Delete approval workflows. Users can also Create, List, Get, and Delete approval workflow steps and approval workflow approvers.</td></tr><tr><td>2024-03-04</td><td>Go SDK</td><td>6.9.0</td><td>This release adds support for managing approval workflows. Using the SDKs/CLI, users can now Create, Update, List, Get, and Delete approval workflows. Users can also Create, List, Get, and Delete approval workflow steps and approval workflow approvers.</td></tr><tr><td>2024-03-04</td><td>Control Plane</td><td>85.7.0</td><td>This release adds the ability to create, update, and delete Approval Workflows.</td></tr><tr><td>2024-03-04</td><td>Terraform Provider</td><td>7.6.0</td><td>This change adds Approval Workflows and related verticals.</td></tr><tr><td>2024-03-04</td><td>Java SDK</td><td>6.8.0</td><td>This change adds Approval Workflows and related verticals.</td></tr><tr><td>2024-03-04</td><td>Python SDK</td><td>6.8.0</td><td>This change adds Approval Workflows and related verticals.</td></tr><tr><td>2024-03-04</td><td>Go SDK</td><td>6.8.0</td><td>This change adds Approval Workflows and related verticals.</td></tr><tr><td>2024-03-04</td><td>Ruby SDK</td><td>6.8.0</td><td>This change adds Approval Workflows and related verticals.</td></tr><tr><td>2024-03-04</td><td>Control Plane</td><td>85.4.0</td><td>This release adds a link to the settings page on the access workflows page of the Admin UI.</td></tr><tr><td>2024-03-02</td><td>Control Plane</td><td>85.3.0</td><td>This release fixes an issue where the resource catalog might appear empty when fetched in ServiceNow.</td></tr><tr><td>2024-03-01</td><td>CLI</td><td>41.20.0</td><td><p>The release fixes a bug where the <code>SourceIP</code> field of queries as returned in the <code>sdm audit queries</code> and associated CLI commands, the Queries API, and Log Stream query log entries incorrectly included a port number in addition to an IP. Queries created since this fix will contain only an IP address in the <code>SourceIP</code> field.</p><p>In addition, this release adds a new <code>ClientIP</code> field to the <code>sdm audit queries</code> and associated CLI commands, the Queries API, and Log Stream query log entries. This is the public-facing IP address that the client that performed a query used to authenticate with the StrongDM servers. This may differ from the <code>SourceIP</code> which is the IP address the client used to connect to the gateway through which the query was performed. These IP addresses may differ when the gateways are on a different network, such as behind a VPN.</p><p>Lastly, this release adds the <code>--extended</code> option to the <code>sdm audit k8s|rdp|ssh</code> CLI commands, which includes some additional extended fields in the query output.</p></td></tr><tr><td>2024-03-01</td><td>Control Plane</td><td>85.2.0</td><td><p>The release fixes a bug where the <code>SourceIP</code> field of queries as returned in the <code>sdm audit queries</code> and associated CLI commands, the Queries API, and Log Stream query log entries incorrectly included a port number in addition to an IP. Queries created since this fix will contain only an IP address in the <code>SourceIP</code> field.</p><p>In addition, this release adds a new <code>ClientIP</code> field to the <code>sdm audit queries</code> and associated CLI commands, the Queries API, and Log Stream query log entries. This is the public-facing IP address that the client that performed a query used to authenticate with the StrongDM servers. This may differ from the <code>SourceIP</code> which is the IP address the client used to connect to the gateway through which the query was performed. These IP addresses may differ when the gateways are on a different network, such as behind a VPN.</p><p>Lastly, this release adds the <code>--extended</code> option to the <code>sdm audit k8s|rdp|ssh</code> CLI commands, which includes some additional extended fields in the query output.</p></td></tr><tr><td>2024-03-01</td><td>Java SDK</td><td>6.7.1</td><td><p>The release fixes a bug where the <code>SourceIP</code> field of queries as returned in the <code>sdm audit queries</code> and associated CLI commands, the Queries API, and Log Stream query log entries incorrectly included a port number in addition to an IP. Queries created since this fix will contain only an IP address in the <code>SourceIP</code> field.</p><p>In addition, this release adds a new <code>ClientIP</code> field to the <code>sdm audit queries</code> and associated CLI commands, the Queries API, and Log Stream query log entries. This is the public-facing IP address that the client that performed a query used to authenticate with the StrongDM servers. This may differ from the <code>SourceIP</code> which is the IP address the client used to connect to the gateway through which the query was performed. These IP addresses may differ when the gateways are on a different network, such as behind a VPN.</p><p>Lastly, this release adds the <code>--extended</code> option to the <code>sdm audit k8s|rdp|ssh</code> CLI commands, which includes some additional extended fields in the query output.</p></td></tr><tr><td>2024-03-01</td><td>Python SDK</td><td>6.7.1</td><td><p>The release fixes a bug where the <code>SourceIP</code> field of queries as returned in the <code>sdm audit queries</code> and associated CLI commands, the Queries API, and Log Stream query log entries incorrectly included a port number in addition to an IP. Queries created since this fix will contain only an IP address in the <code>SourceIP</code> field.</p><p>In addition, this release adds a new <code>ClientIP</code> field to the <code>sdm audit queries</code> and associated CLI commands, the Queries API, and Log Stream query log entries. This is the public-facing IP address that the client that performed a query used to authenticate with the StrongDM servers. This may differ from the <code>SourceIP</code> which is the IP address the client used to connect to the gateway through which the query was performed. These IP addresses may differ when the gateways are on a different network, such as behind a VPN.</p><p>Lastly, this release adds the <code>--extended</code> option to the <code>sdm audit k8s|rdp|ssh</code> CLI commands, which includes some additional extended fields in the query output.</p></td></tr><tr><td>2024-03-01</td><td>Go SDK</td><td>6.7.1</td><td><p>The release fixes a bug where the <code>SourceIP</code> field of queries as returned in the <code>sdm audit queries</code> and associated CLI commands, the Queries API, and Log Stream query log entries incorrectly included a port number in addition to an IP. Queries created since this fix will contain only an IP address in the <code>SourceIP</code> field.</p><p>In addition, this release adds a new <code>ClientIP</code> field to the <code>sdm audit queries</code> and associated CLI commands, the Queries API, and Log Stream query log entries. This is the public-facing IP address that the client that performed a query used to authenticate with the StrongDM servers. This may differ from the <code>SourceIP</code> which is the IP address the client used to connect to the gateway through which the query was performed. These IP addresses may differ when the gateways are on a different network, such as behind a VPN.</p><p>Lastly, this release adds the <code>--extended</code> option to the <code>sdm audit k8s|rdp|ssh</code> CLI commands, which includes some additional extended fields in the query output.</p></td></tr><tr><td>2024-03-01</td><td>Ruby SDK</td><td>6.7.1</td><td><p>The release fixes a bug where the <code>SourceIP</code> field of queries as returned in the <code>sdm audit queries</code> and associated CLI commands, the Queries API, and Log Stream query log entries incorrectly included a port number in addition to an IP. Queries created since this fix will contain only an IP address in the <code>SourceIP</code> field.</p><p>In addition, this release adds a new <code>ClientIP</code> field to the <code>sdm audit queries</code> and associated CLI commands, the Queries API, and Log Stream query log entries. This is the public-facing IP address that the client that performed a query used to authenticate with the StrongDM servers. This may differ from the <code>SourceIP</code> which is the IP address the client used to connect to the gateway through which the query was performed. These IP addresses may differ when the gateways are on a different network, such as behind a VPN.</p><p>Lastly, this release adds the <code>--extended</code> option to the <code>sdm audit k8s|rdp|ssh</code> CLI commands, which includes some additional extended fields in the query output.</p></td></tr><tr><td>2024-03-01</td><td>Control Plane</td><td>85.0.0</td><td>This release fixes an issue that caused the <strong>Request Access</strong> page and its tabs not to load properly in the Admin UI.</td></tr><tr><td>2024-03-01</td><td>Control Plane</td><td>84.98.0</td><td>This change adds a notification email sent to organization admins for non-transient Device Trust API failures.</td></tr><tr><td>2024-02-29</td><td>Control Plane</td><td>84.93.0</td><td>This release fixes an issue with dynamic access rules on access workflows, where they couldn't be updated under certain conditions.</td></tr><tr><td>2024-02-28</td><td>Control Plane</td><td>84.88.0</td><td><p>This release introduces a change to the file format and path location of replay data stored to Amazon S3 with Log Stream enabled, to improve the performance of storing that data. Replay data is no longer stored under individual objects (one object per chunk), but is instead aggregated so that multiple chunks from different replays may be stored in the same object, up to a limit of 1000 entries or 100 MB per object.</p><p>Replay data from Log Stream is now stored similarly to activity and query data. Specifically:</p><ul><li>The path under which replays are stored in S3 changes from <code>&#x26;lt;prefix&#x26;gt;/replays/YYYY/MM/DD/HH/MM/&#x26;lt;queryUUID&#x26;gt;/&#x26;lt;chunkID&#x26;gt;.json</code> to <code>&#x26;lt;prefix&#x26;gt;/replays/YYYY/MM/DD/HH/MM/&#x26;lt;randomUUID&#x26;gt;.json</code>.</li><li>The content of each JSON object changes from a single chunk per object (<code>{&#x26;#34;formatVersion&#x26;#34;:&#x26;#34;v1.0.0&#x26;#34;, &#x26;#34;chunkID&#x26;#34;:&#x26;#34;1&#x26;#34; ...}</code>) to N chunks separated by new lines (that is, in JSON lines format, as with queries and activities).</li></ul></td></tr><tr><td>2024-02-28</td><td>Control Plane</td><td>84.87.0</td><td>This changeset clarifies text for access workflows and approval workflows throughout the Admin UI.</td></tr><tr><td>2024-02-28</td><td>Terraform Provider</td><td>7.5.0</td><td>This change introduces the new AWS Private CA X.509 Certificate secret store. This secret store is marked as unstable and, as such, is not available for general use yet.</td></tr><tr><td>2024-02-27</td><td>CLI</td><td>41.18.0</td><td>This change introduces the new AWS Private CA X.509 Certificate secret store. This secret store is marked as unstable and, as such, is not available for general use yet.</td></tr><tr><td>2024-02-27</td><td>Java SDK</td><td>6.7.0</td><td>This change introduces the new AWS Private CA X.509 Certificate secret store. This secret store is marked as unstable and, as such, is not available for general use yet.</td></tr><tr><td>2024-02-27</td><td>Python SDK</td><td>6.7.0</td><td>This change introduces the new AWS Private CA X.509 Certificate secret store. This secret store is marked as unstable and, as such, is not available for general use yet.</td></tr><tr><td>2024-02-27</td><td>Go SDK</td><td>6.7.0</td><td>This change introduces the new AWS Private CA X.509 Certificate secret store. This secret store is marked as unstable and, as such, is not available for general use yet.</td></tr><tr><td>2024-02-27</td><td>Ruby SDK</td><td>6.7.0</td><td>This change introduces the new AWS Private CA X.509 Certificate secret store. This secret store is marked as unstable and, as such, is not available for general use yet.</td></tr><tr><td>2024-02-27</td><td>Control Plane</td><td>84.75.0</td><td>This change reports a mocked version of a legacy variable to CLI versions older than 37.0.0 (released February 14, 2023). This variable was removed on February 24, 2024. The absence of this variable could cause the CLI to fail to respect port overrides on new connections.</td></tr><tr><td>2024-02-26</td><td>Java SDK</td><td>6.6.0</td><td>This release adds the approval flow ID field to access workflows.</td></tr><tr><td>2024-02-26</td><td>Go SDK</td><td>6.6.0</td><td>This release adds the approval flow ID field to access workflows.</td></tr><tr><td>2024-02-26</td><td>Python SDK</td><td>6.6.0</td><td>This release adds the approval flow ID field to access workflows.</td></tr><tr><td>2024-02-26</td><td>Ruby SDK</td><td>6.6.0</td><td>This release adds the approval flow ID field to access workflows.</td></tr><tr><td>2024-02-26</td><td>Desktop Application</td><td>21.58.0</td><td><p>Installer behavior has changed to allow silent installations on macOS and Windows and for installations to include updates to Virtual Networking Mode.</p><p>On macOS, all PKG installers always require admin privilege, always install StrongDM in <code>/Applications</code> (but are owned by the end user so that update-in-place can still work), and always install the Virtual Networking Mode helper application.</p><p>If macOS users want to install the desktop app without Virtual Networking Mode, they should use the DMG distribution. For a silent installation, macOS users should run the installer command line tool with the PKG file as a command line argument.</p><p>On Windows, the EXE installers now install Virtual Networking Mode whenever the installer runs as Administrator. If the EXE installer is run as a non-administrator, StrongDM gets installed, but Virtual Networking Mode is not installed or updated.</p><p>If Windows users want to install the desktop app without Virtual Networking Mode, they should run the installer as a non-administrator.</p><p>Note that the EXE installers on Windows can be executed from the Command Prompt, and the installation will be in silent mode if the <code>/S</code> flag is used with the command.</p></td></tr><tr><td>2024-02-23</td><td>Control Plane</td><td>84.67.0</td><td>This release adds the <strong>Update Admins</strong> scope to API keys. This is a sensitive scope that allows your key to update admin users.</td></tr><tr><td>2024-02-23</td><td>CLI</td><td>41.15.0</td><td>This change removes some deprecated capabilities around disabling port overrides. In particular, some CLI commands under <code>sdm admin ports</code> have been removed.</td></tr><tr><td>2024-02-23</td><td>Control Plane</td><td>84.63.0</td><td>This release updates the StrongDM app for Slack with improved tag search functionality that matches the way tag searching works in the Admin UI.</td></tr><tr><td>2024-02-23</td><td>CLI</td><td>41.14.0</td><td>This change adds the <code>--download</code> option to the <code>sdm replay rdp</code> CLI command, which allows users to download formatted query logs from StrongDM and immediately render an MP4 from them. Previously, the logs had to be manually retrieved from a relay's <code>logs</code> directory. This does not currently support user-encrypted RDP logs.</td></tr><tr><td>2024-02-22</td><td>Control Plane</td><td>84.61.0</td><td>This release fixes a bug that caused resources assigned to peering groups to sometimes incorrectly show as reachable from nodes not in the resource's peering group on the <strong>Resources</strong> tab of the Admin UI <strong>Network > Relays</strong> page, the Admin UI <strong>Network > Gateways</strong> page, and the output of the <code>sdm admin relays list</code> in the CLI. In addition, this release fixes a bug that caused resources shown on the <strong>Resources</strong> tab of those Admin UI pages not to be ordered by name.</td></tr><tr><td>2024-02-22</td><td>Control Plane</td><td>84.55.0</td><td>This release adds support for all filters documented by the CLI help text for <code>sdm admin resources list --filters-help</code>.</td></tr><tr><td>2024-02-22</td><td>CLI</td><td>41.10.0</td><td>This release adds support for all filters documented by the CLI help text for <code>sdm admin resources list --filters-help</code>.</td></tr><tr><td>2024-02-21</td><td>Control Plane</td><td>84.53.0</td><td>This change fixes a bug in device trust calculations which would prevent assessment storage from CrowdStrike for a CrowdStrike account with over 500 agents.</td></tr><tr><td>2024-02-21</td><td>Control Plane</td><td>84.51.0</td><td>User names will no longer prevent creation of service accounts with the same name.</td></tr><tr><td>2024-02-20</td><td>CLI</td><td>41.8.0</td><td>This release introduces the GCP Certificate Authority Service, which is not yet available for general use.</td></tr><tr><td>2024-02-20</td><td>Terraform Provider</td><td>7.3.0</td><td>This release introduces the GCP Certificate Authority Service, which is not yet available for general use.</td></tr><tr><td>2024-02-20</td><td>Control Plane</td><td>84.42.0</td><td>This release introduces the GCP Certificate Authority Service, which is not yet available for general use.</td></tr><tr><td>2024-02-20</td><td>Java SDK</td><td>6.5.0</td><td>This release introduces the GCP Certificate Authority Service, which is not yet available for general use.</td></tr><tr><td>2024-02-20</td><td>Go SDK</td><td>6.5.0</td><td>This release introduces the GCP Certificate Authority Service, which is not yet available for general use.</td></tr><tr><td>2024-02-20</td><td>Python SDK</td><td>6.5.0</td><td>This release introduces the GCP Certificate Authority Service, which is not yet available for general use.</td></tr><tr><td>2024-02-20</td><td>Ruby SDK</td><td>6.5.0</td><td>This release introduces the GCP Certificate Authority Service, which is not yet available for general use.</td></tr><tr><td>2024-02-20</td><td>Control Plane</td><td>84.40.0</td><td>This release fixes an issue where access requests which were automatically approved would not show the correct approved timestamp when viewing the request details page in the Admin UI.</td></tr><tr><td>2024-02-20</td><td>Control Plane</td><td>84.38.0</td><td>This release fixes an issue where activities would not live feed into the Admin UI page on initial load.</td></tr><tr><td>2024-02-16</td><td>Control Plane</td><td>84.36.0</td><td>This release fixes an issue where the access requests page of the Admin UI would not load in some instances.</td></tr><tr><td>2024-02-16</td><td>CLI</td><td>41.6.0</td><td>This release fixes an issue with the CLI where the <code>sdm doctor -v</code> command did not return any output.</td></tr><tr><td>2024-02-12</td><td>Control Plane</td><td>84.6.0</td><td>This release fixes the access details text shown on the Admin UI Request Access page to not reference a reason if there is none.</td></tr><tr><td>2024-02-09</td><td>Control Plane</td><td>84.2.0</td><td>This release fixes a bug that caused the <code>/sdm access to</code> command in the StrongDM integration for Slack not to work for non-admin users.</td></tr><tr><td>2024-02-09</td><td>Ruby SDK</td><td>6.4.0</td><td>This release adds the new resource type, RDP (Certificate Based) server, which supports Remote Identities.</td></tr><tr><td>2024-02-09</td><td>Java SDK</td><td>6.4.0</td><td>This release adds the new resource type, RDP (Certificate Based) server, which supports Remote Identities.</td></tr><tr><td>2024-02-09</td><td>Terraform Provider</td><td>7.2.0</td><td>This release adds the new resource type, RDP (Certificate Based) server, which supports Remote Identities.</td></tr><tr><td>2024-02-09</td><td>Python SDK</td><td>6.4.0</td><td>This release adds the new resource type, RDP (Certificate Based) server, which supports Remote Identities.</td></tr><tr><td>2024-02-09</td><td>Go SDK</td><td>6.4.0</td><td>This release adds the new resource type, RDP (Certificate Based) server, which supports Remote Identities.</td></tr><tr><td>2024-02-08</td><td>Control Plane</td><td>83.93.0</td><td>This release adds the <strong>Request timeout duration</strong> setting to the <strong>Settings</strong> > <strong>Workflows</strong> page of the Admin UI.</td></tr><tr><td>2024-02-07</td><td>Control Plane</td><td>83.83.0</td><td>The StrongDM integration for Slack has been updated to a new version. This version offers: - Channel-based approvals - Multiple-resource requests - Easier request/resource filtering - UI/UX improvements</td></tr><tr><td>2024-02-07</td><td>Control Plane</td><td>83.79.0</td><td>Creating an access request with a reason now has max length validation that matches the server.</td></tr><tr><td>2024-02-05</td><td>Control Plane</td><td>83.59.0</td><td><p>This release adds the <strong>Certificate Authority</strong> field to the RDP (Certificate Based) and SSH (Certificate Based) resource forms, allowing users to select a desired Certificate Authority (default is Strong CA). Strong CA is the StrongDM RDP Certificate Authority or StrongDM SSH Certificate Authority, depending on the selected server type.</p><p>Strong CA is selected by default and is always the default, even if the <strong>Allow Credentials to be Stored with StrongDM</strong> option is set in the Admin UI > <strong>Settings</strong> > <strong>Security</strong>. Strong CA may be managed in the Admin UI > <strong>Network</strong> > <strong>Certificate Authorities</strong>.</p></td></tr><tr><td>2024-02-03</td><td>Control Plane</td><td>83.52.0</td><td>This release fixes a bug when running the <code>sdm audit queries</code> and related CLI commands, where including a filter using the <code>query</code> field to filter by query content would return an error that the filter was invalid.</td></tr><tr><td>2024-02-02</td><td>Control Plane</td><td>83.49.0</td><td>This release changes the application of the security setting "Allow Credentials to be Stored with StrongDM." Certificate-based resources, such as SSH (Certificate Based) and RDP (Certificate Based), may be created without assigning a secret store, even if the "Allow Credentials to be Stored with StrongDM" security setting is set to "No."</td></tr><tr><td>2024-02-01</td><td>Control Plane</td><td>83.43.0</td><td>This release adjusts the text in the enterprise banner at the top of workflow related pages to no longer reference Reports Library but rather Access Workflows.</td></tr><tr><td>2024-02-01</td><td>CLI</td><td>40.89.0</td><td>This release adds secret stores that will request signed x509 certificates from the PKI configured in the secret store. The initially supported PKI is HashiCorp Vault PKI. This new secret store is marked unstable and, as such, is not available for use yet.</td></tr><tr><td>2024-02-01</td><td>Control Plane</td><td>83.40.0</td><td>This release adds secret stores that will request signed x509 certificates from the PKI configured in the secret store. The initially supported PKI is HashiCorp Vault PKI. This new secret store is marked unstable and, as such, is not available for use yet.</td></tr><tr><td>2024-01-31</td><td>Control Plane</td><td>83.34.0</td><td>This release removes the option to select suspended users as approvers for access workflows.</td></tr><tr><td>2024-01-31</td><td>Java SDK</td><td>6.3.2</td><td>This release upgrades the GRPC dependency of the Java SDK to version 1.59.1. This version of the GRPC library fixes an incompatibility with newer versions of the Netty library, which may prevent the SDK from working with frameworks such as recent versions of Spring Boot.</td></tr><tr><td>2024-01-31</td><td>Control Plane</td><td>83.32.0</td><td>This release adjusts the logout condition for SentinelOne Device Trust. Previously devices would be logged out if SentinelOne reported them as not live, but testing revealed this value was not being consistently reported; live agents would sometimes be marked offline, causing random logouts. The replacement for this condition requires that a device is offline for 15 minutes before that results in an automatic logout.</td></tr><tr><td>2024-01-30</td><td>Control Plane</td><td>83.24.0</td><td>This release allows new certificates to be created for both SSH and RDP without immediately making them active. You can create a certificate, add it to your infrastructure, and then make it active in StrongDM. This enables the certificate rotation process to happen without downtime due to the delay from adding a new certificate. Additionally, previous certificates may be reactivated as a rollback option until they are removed. Certificate Authorities can be managed in the new <strong>Network</strong> > <strong>Certificate Authorities</strong> section of the Admin UI.</td></tr><tr><td>2024-01-29</td><td>Desktop Application</td><td>21.54.0</td><td>This release restores the missing <strong>Connect All</strong> menu item to the desktop app menu.</td></tr><tr><td>2024-01-29</td><td>Control Plane</td><td>83.9.0</td><td>This release fixes an issue where some organizations could not see reports in the Reports Library.</td></tr><tr><td>2024-01-26</td><td>Control Plane</td><td>83.4.0</td><td>This release marks the standing access report as no longer in beta.</td></tr><tr><td>2024-01-26</td><td>Control Plane</td><td>83.3.0</td><td>This release fixes a bug in filter functionality for the Access Workflows dashboard.</td></tr><tr><td>2024-01-25</td><td>Java SDK</td><td>6.3.0</td><td>This release adds an SDK vertical to request checks for and retrieve the healthiness of the connections between nodes and secret stores.</td></tr><tr><td>2024-01-25</td><td>Go SDK</td><td>6.3.0</td><td>This release adds an SDK vertical to request checks for and retrieve the healthiness of the connections between nodes and secret stores.</td></tr><tr><td>2024-01-25</td><td>Python SDK</td><td>6.3.0</td><td>This release adds an SDK vertical to request checks for and retrieve the healthiness of the connections between nodes and secret stores.</td></tr><tr><td>2024-01-25</td><td>Ruby SDK</td><td>6.3.0</td><td>This release adds an SDK vertical to request checks for and retrieve the healthiness of the connections between nodes and secret stores.</td></tr><tr><td>2024-01-25</td><td>Control Plane</td><td>82.90.0</td><td>Add pkg and msi installers to the downloads page</td></tr><tr><td>2024-01-25</td><td>Control Plane</td><td>82.89.0</td><td>This release fixes a bug where in rare cases a valid authentication with an admin token or API key would return an unauthenticated error.</td></tr><tr><td>2024-01-25</td><td>Control Plane</td><td>82.88.0</td><td>Slack tokens are no longer revoked after a failed refresh attempt.</td></tr><tr><td>2024-01-25</td><td>Control Plane</td><td>82.87.0</td><td>Update the default filter on the Standing Access Dashboard.</td></tr><tr><td>2024-01-25</td><td>Control Plane</td><td>82.86.0</td><td><p>This release augments resource update validation in the case when the secret store of the resource is modified.</p><p>See also Server 82.80.0.</p></td></tr><tr><td>2024-01-24</td><td>CLI</td><td>40.78.0</td><td>This release allows the Secret Store field on resources to be updated after creation. When transitioning from using a non-Strong Vault secret store to any other, or vice versa, all sensitive credential field values (those hidden in the AdminUI) are reset to ensure they are not exposed in plaintext. The Terraform Provider still recreates resources when their secret store is updated to ensure it doesn't lose track of its state because of the reset sensitive fields.</td></tr><tr><td>2024-01-24</td><td>Control Plane</td><td>82.80.0</td><td>This release allows the Secret Store field on resources to be updated after creation. When transitioning from using a non-Strong Vault secret store to any other, or vice versa, all sensitive credential field values (those hidden in the AdminUI) are reset to ensure they are not exposed in plaintext. The Terraform Provider still recreates resources when their secret store is updated to ensure it doesn't lose track of its state because of the reset sensitive fields.</td></tr><tr><td>2024-01-23</td><td>Control Plane</td><td>82.75.0</td><td>This release fixes a broken banner link for StrongDM email alerts.</td></tr><tr><td>2024-01-23</td><td>Control Plane</td><td>82.74.0</td><td>This release fixes a condition where authentications could take up to several seconds before they were available to use after logging in.</td></tr><tr><td>2024-01-23</td><td>Control Plane</td><td>82.73.0</td><td>This change fixes the filter parameters for the Approvers list in the Access Workflows dashboard.</td></tr><tr><td>2024-01-23</td><td>Control Plane</td><td>82.70.0</td><td>This release overhauls the presentation of Reports Library dashboards.</td></tr><tr><td>2024-01-22</td><td>Control Plane</td><td>82.68.0</td><td>This change fixes a bug with a deprecated authentication mode used by clients beneath 33.17.0, where those authentications were frequently revoked without reason.</td></tr><tr><td>2024-01-19</td><td>Java SDK</td><td>6.2.1</td><td>This change removes some unimplemented snapshot APIs.</td></tr><tr><td>2024-01-19</td><td>Python SDK</td><td>6.2.1</td><td>This change removes some unimplemented snapshot APIs.</td></tr><tr><td>2024-01-19</td><td>Ruby SDK</td><td>6.2.1</td><td>This change removes some unimplemented snapshot APIs.</td></tr><tr><td>2024-01-19</td><td>Go SDK</td><td>6.2.1</td><td>This change removes some unimplemented snapshot APIs.</td></tr><tr><td>2024-01-18</td><td>CLI</td><td>40.73.0</td><td>This release fixes an issue that prevented successful authentication for SSH certificate-based resources that had Secret Store IDs set.</td></tr><tr><td>2024-01-18</td><td>CLI</td><td>40.59.1</td><td>This release fixes an issue that prevented successful authentication for SSH certificate-based resources that had Secret Store IDs set.</td></tr><tr><td>2024-01-18</td><td>Control Plane</td><td>82.54.0</td><td>Added a checkbox in the Admin UI to allow requesters to approve their own requests when they meet the approval criteria for the associated workflow.</td></tr><tr><td>2024-01-16</td><td>Java SDK</td><td>6.2.0</td><td>This release updates the SDKs to enable retrieving configured RDP CAs.</td></tr><tr><td>2024-01-16</td><td>CLI</td><td>40.67.0</td><td>This release adds the 'sdm admin rdp view-ca' CLI command to retrieve the CA used for certificate-based RDP connections.</td></tr><tr><td>2024-01-16</td><td>Python SDK</td><td>6.2.0</td><td>This release updates the SDKs to enable retrieving configured RDP CAs.</td></tr><tr><td>2024-01-16</td><td>Go SDK</td><td>6.2.0</td><td>This release updates the SDKs to enable retrieving configured RDP CAs.</td></tr><tr><td>2024-01-16</td><td>Ruby SDK</td><td>6.2.0</td><td>This release updates the SDKs to enable retrieving configured RDP CAs.</td></tr><tr><td>2024-01-16</td><td>Terraform Provider</td><td>7.1.0</td><td>This release updates the SDKs to enable retrieving configured RDP CAs.</td></tr><tr><td>2024-01-12</td><td>Control Plane</td><td>82.35.0</td><td>This release modifies the behavior of the integration with Slack, including help text and welcome message frequency changes.</td></tr><tr><td>2024-01-12</td><td>Control Plane</td><td>82.30.0</td><td>This release restores the presence of some missing release notes from the <code>/release-notes</code> endpoint.</td></tr><tr><td>2024-01-11</td><td>CLI</td><td>40.63.0</td><td>This release renames the columns of CSV query output to be more consistent between query categories. It also adds three new fields for features in development.</td></tr><tr><td>2024-01-11</td><td>CLI</td><td>40.61.0</td><td>This release adds a new, non-stable server type: SSH (Cert Based with User Provisioning). This new server type is in closed beta and not available at this time.</td></tr><tr><td>2024-01-09</td><td>CLI</td><td>40.57.0</td><td>This release deprecates the <code>sdm admin ssh rotate-ca</code> command. The correct way to rotate SSH CA is through the credential management area in the Admin UI.</td></tr><tr><td>2024-01-09</td><td>Control Plane</td><td>82.11.0</td><td>Admins can now set a fixed duration for access requests on the Workflows settings page of the Admin UI.</td></tr><tr><td>2024-01-08</td><td>CLI</td><td>40.55.0</td><td>This release updates the permissions checked when calling <code>sdm ssh resource-name</code>, fixing a recent regression which prevented user-level accounts from executing this action.</td></tr><tr><td>2024-01-08</td><td>CLI</td><td>40.54.0</td><td>This release fixes an issue that prevented connections to certain resources with an "unable to load credential type for db type" error. This error is resolved.</td></tr><tr><td>2024-01-08</td><td>Python SDK</td><td>6.1.0</td><td>This release adds a <code>Healthcheck</code> verb to the SDKs and the <code>sdm admin &#x26;lt;resource-category&#x26;gt;</code> CLI trees. From the CLI, one may request a healthcheck via a resource's ID or its name. Note admin tokens are not able to request checks by name if they lack the permission to list resources, as they will not be able to look up the resource.</td></tr><tr><td>2024-01-08</td><td>CLI</td><td>40.51.0</td><td>This release adds a <code>Healthcheck</code> verb to the SDKs and the <code>sdm admin &#x26;lt;resource-category&#x26;gt;</code> CLI trees. From the CLI, one may request a healthcheck via a resource's ID or its name. Note admin tokens are not able to request checks by name if they lack the permission to list resources, as they will not be able to look up the resource.</td></tr><tr><td>2024-01-08</td><td>Java SDK</td><td>6.1.0</td><td>This release adds a <code>Healthcheck</code> verb to the SDKs and the <code>sdm admin &#x26;lt;resource-category&#x26;gt;</code> CLI trees. From the CLI, one may request a healthcheck via a resource's ID or its name. Note admin tokens are not able to request checks by name if they lack the permission to list resources, as they will not be able to look up the resource.</td></tr><tr><td>2024-01-08</td><td>Go SDK</td><td>6.1.0</td><td>This release adds a <code>Healthcheck</code> verb to the SDKs and the <code>sdm admin &#x26;lt;resource-category&#x26;gt;</code> CLI trees. From the CLI, one may request a healthcheck via a resource's ID or its name. Note admin tokens are not able to request checks by name if they lack the permission to list resources, as they will not be able to look up the resource.</td></tr><tr><td>2024-01-08</td><td>Ruby SDK</td><td>6.1.0</td><td>This release adds a <code>Healthcheck</code> verb to the SDKs and the <code>sdm admin &#x26;lt;resource-category&#x26;gt;</code> CLI trees. From the CLI, one may request a healthcheck via a resource's ID or its name. Note admin tokens are not able to request checks by name if they lack the permission to list resources, as they will not be able to look up the resource.</td></tr><tr><td>2024-01-05</td><td>Control Plane</td><td>82.2.0</td><td>This changeset adds support for IDP initiated logins for SAML, if enabled within one's StrongDM SSO configuration.</td></tr><tr><td>2024-01-04</td><td>adminui</td><td>86.20.0</td><td>This release makes some minor bug fixes for filters within dashboards.</td></tr><tr><td>2024-01-04</td><td>Ruby SDK</td><td>6.0.1</td><td>This release unlocks the gemspec for the strongdm ruby SDK expanding openssl from ~> 3.1.0 to ~> 3.1.</td></tr><tr><td>2024-01-03</td><td>adminui</td><td>86.19.0</td><td>This release adjusts and improves the user experience for filters within dashboards.</td></tr><tr><td>2024-01-02</td><td>Control Plane</td><td>81.81.0</td><td>This release adds a feature to alert organization admins for when the StrongDM RDP CA is close to expiring. It will send alert emails for the following stages: 30 days before expiration, 2 weeks before expiration, 1 week before expiration, 2 days before expiration, 1 day before expiration, and 2 days after expiration.</td></tr></tbody></table>

For changes from previous years, see the Release Notes Archive


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.strongdm.com/changelog/release-notes.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
