Release 17.5.0#55409
Merged
doggydogworld merged 5 commits intobranch/v17from Jun 4, 2025
Merged
Conversation
camscale
reviewed
Jun 3, 2025
| ### Azure DevOps joining | ||
| Teleport will support secretless authentication for Bots running within Azure DevOps pipelines. | ||
|
|
||
| ### Other fixes and improvements |
Contributor
There was a problem hiding this comment.
Can you add a "Security Fixes" section before this one with the changelog entries for those fixes?
Contributor
Author
There was a problem hiding this comment.
Added the section. Not sure if it's too verbose though. What do you think @r0mant
zmb3
reviewed
Jun 3, 2025
| ## 17.5.0 (06/03/25) | ||
|
|
||
| ### Azure Console via SAML IdP | ||
| Teleport SAML IdP will support Azure web console as a service provider. |
Collaborator
There was a problem hiding this comment.
On the upcoming releases page, future tense (will) makes sense, but when we move this to the changelog we need to reword it a bit.
Contributor
Author
There was a problem hiding this comment.
Reworded it so it should be present tense.
Contributor
|
Can we please include #54215 in this release? |
ca0beb0 to
9cffe2a
Compare
rosstimothy
approved these changes
Jun 4, 2025
camscale
approved these changes
Jun 4, 2025
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
17.5.0 (06/03/25)
Azure Console via SAML IdP
Teleport SAML IdP now supports Azure web console as a service provider.
Desktop Access in Teleport Connect
Teleport Connect now allows users to connect to Windows desktops directly from the Teleport Connect application without needing to use a browser.
Desktop Access latency detector
Teleport's web UI now shows latency measurements during remote desktop sessions which indicate both the latency between the user and the Teleport proxy as well as the latency between the Teleport proxy and the target host.
Machine & Workload Identity - Sigstore attestation
Machine & Workload Identity now supports attesting Sigstore signatures of workloads running on Docker, Podman and Kubernetes. This allows the issuance of credentials to be restricted to workloads with container images produced by legitimate CI/CD systems.
Azure DevOps joining
Teleport now supports secretless authentication for Bots running within Azure DevOps pipelines.
Security fixes
This release also includes fixes for the following security issues.
These issues are present in previous v17 releases.
Impacted users are recommended to upgrade their auth and proxy servers to the latest version.
[High] Unauthorized deletion in AWS IAM Identity Center integration
This vulnerability affects all AWS IAM Identity Center integration users. You can check whether you have AWS Identity Center integration installed either in the Teleport web UI under Zero Trust Access / Integrations or by running “tctl get plugins/aws-identity-center” CLI command.
[High] Short to long term access escalation in Okta integration
In Okta integration configurations with enabled access lists sync, a user with an approved just-in-time access request to an Okta application could be unintentionally promoted to an access list granting access to the same application. This would result in the access to the Okta app/group persisting after the access request expiration.
This vulnerability affects Okta integration users who have access lists sync enabled. You can check whether you have an Okta integration installed with access lists sync enabled either in the Teleport web UI under Zero Trust Access / Integrations page or by running “tctl get plugins/okta” CLI command and looking at the “spec.settings.okta.sync_settings.sync_access_lists” flag.
[High] Credential theft via GitHub SSO authentication flow
This vulnerability affects GitHub SSO users. You can check whether you’re using GitHub SSO either on the Zero Trust Access / Auth Connectors page in Teleport web UI or by running “tctl get connectors” CLI command against your cluster.
Other fixes and improvements
ssh_service.listen_addrto forcibly be enabled when operating in reverse tunnel mode to provide an optional direct access path to hosts. #54215tctlrendering of timestamps in BotInstance resource YAML. #55163--db-uservalues on PKINIT flow. #55142http-postbinding authentication method. The feature can be enabled from the SSO connector configuration by adding a new field aspreferred_request_binding: http-post. #55065teleport-clusterHelm chart to useauthentication.secondFactorrather thanauthentication.secondFactorsto avoid incompatibility during upgrades. #54735--no-oneshotand similar flags to override config file values. #54651Enterprise: