Changelog

New updates and improvements to Dispel.

March 15, 2024

Device Accounts

 

Device Accounts

Device Accounts streamline the process of logging into remote devices while eliminating the need for users to handle sensitive credentials directly. Dispel administrators can create Device Accounts by supplying the necessary authentication credentials and configuring the protocols and ports the account can utilize on the associated device. Furthermore, administrators can specify which Dispel members are permitted to connect using the Device Account. Credentials are encrypted in specialized storage and are never stored in the Dispel database.

By using Device Accounts, the risk of breaches is significantly minimized as it reduces the number of individuals with access to sensitive account credentials. Device Accounts also expedite access to remote devices by enabling users to log in with just a single click.

Fixes & improvements 
  • Updated our Mandarin, French, German, Portuguese and Spanish Language Translations
  • Addressed several navigation and scrolling issues throughout the Dashboard
  • Fixed a bug that resulted in the wrong email address being displayed when an Access Window is created
  • Improved usability by moving Group Devices to the top of the device list when ACLs are activated on them
  • Improved the page load experience for ACLs when there are many ACLs configured
  • We now log an event when Users, Regions, Facilities, Groups, and Devices are deleted
  • Clarified the error messages associated with inviting new users to give better guidance on remediation
  • We now prevent existing Users from re-using VSO links 
  • Fixed a bug that was preventing the filtering of Stacks

February 26, 2024

Organization-Wide Single Sign On

Administrators can now enforce that all their users must sign in using single-sign on when logging into Dispel. Previously, users could sign in via SSO or a hybrid model where Dispel Privileged Access Management worked alongside an SSO platform such as Okta or Microsoft Active Directory. With this new update, admins can require that all users must use the organization's SSO provider to authenticate. This disables Dispel Privileged Access Management within the dashboard.

This allows your organization admins more control over user passwords, and can control who has access to the application from the dashboard of the SSO identity provider. With this, admins have centralized management of all their users and all types of users within their organization.

 

Bug Fixes and Updates

  • Fixed translations in Password Vaulting.
  • Fixed an issue with showing a success toast when an admin re-sends an invite to a member that hasn’t accepted their invitation.

January 29, 2024

Group Access Windows

GroupAccessWindows

Group Access Windows

Access Windows are fast and safe way to allow users "just in time" access to your devices.

With the introduction of Group Access Windows, you can now create Access Windows in bulk and extend them to entire role based access control (RBAC) Groups.

 

Facility Level Groups

Groups, and the ability to use invite links to onboard users into them, are a powerful feature for management at scale. Previously, as Groups have the ability to span multiple facilities, these features were only available for organization-wide admins. With this release, we are launching the ability to scope groups and their invite links within a facility level, thus providing enhanced control and flexibility for admins who manage facilities, but not the whole organization. Facility-level admin who have control over even just a single site can now independently create groups, and generate invitation links attached to those groups to efficiently and securely onboard and manage their internal and vendor teams.

 

Fixes and Improvements

  • Updated our emails to include more local languages
  • Fixed a documentation link in the Nozomi Import feature
  • Cleared out old API routes to keep everything nice and neat
  • Added missing translations for the request access flow

December 04, 2023

Bulk import devices

You can now import a lot of devices at once using a CSV file. Go to Devices and click Add Devices in the 2nd column, in the dropdown you will now have a new option to Add Multiple Devices. Additionally we provide a CSV template on that page that you can download and use when you build out your CSV.

Additional languages

Within the coming couple of weeks we’re looking to launch Brazilian Portuguese and Simplified Chinese as new language options on our platform. Currently, in addition to English, we support Japanese, German, French, and Spanish. You can access the settings to change your language under Account Settings. If you’d like to beta test Brazilian Portuguese or Simplified Chinese on your deployment, please talk to your account manager.

Fixes and Improvements

  • We now hide Virtual Desktop passwords by default and you can only see passwords of your own Virtual Desktop.
  • We now show if a Stack has been paused due to failed builds and show information about how to get it unpaused.
  • Fixed a rate limiting issue for the password reset flow.
  • It’s now possible to copy the Wicket ID on the Wicket list item. This will be helpful if you want to bulk import devices, as the Wicket ID is a required item in the CSV template.
  • Fixed an issue with SSO during the vendor self-onboarding process.
  • Fixed an issue where it was not possible to create a Stack unless the language was set to English.
  • Fixed an issue where the Approving or Denying of Access Windows would not work under certain circumstances.
  • Fixed an issue where it was not possible to reserve a Virtual Desktop from the Access Window Connect tab.
  • Fixed an issue where sometimes a double Virtual Desktop reservation would occur.
  • Fixed an issue where it was not possible to remove a Member from a Region if they were added via a Member Group.
  • Fixed a few translation issues in Japanese.