Skip to main content
2/4/2026

💎 Improvements

  • Events - Disable inputs when attributes values are empty
  • IT Tenant - Show Auto update section in General settings
2/1/2026

✨ New:

  • Automatic domain JIT account deletion if the account is not used for 30 days
1/17/2026

✨ New:

  • Offline rules for elevation and allowlisting (macOS and Windows)
12/15/2025

✨ New:

  • Admin email elevation notifications
  • User email elevation notifications
  • Reason for elevation
  • Snooze allowlisting user pop ups
  • Allowlist all verified publishers (Windows and macOS)

💎 Improvements

  • Improved fragile apps handling in the audit mode

🐞 Fixes

  • Frequent MSA account update skipped to avoid replication conflicts
  • Fixed the issue with application fencing not triggering post elevation flow
  • Fixed the issue with multiple badge ids associated with a user record on enrollment
11/11/2025

✨ New:

  • Application allowlisting for macOS (catalog, fencing, rule engine, and more)
10/14/2025

✨ New:

  • macOS 2.0.0
  • Unified macOS installation
  • Menu bar dropdown on maOS (notifications and settings update)

💎 Improvements

  • Migrated from daemon to macOS security extension
  • Migrated to APNS notifications
  • Reduced file size from 100MB to 35MB
9/14/2025

✨ New:

  • macOS 1.16
  • Support for macOS Tahoe

💎 Improvements

  • macOS UI refresh with udpated screen
  • Windows agent migration to .NET 8.0
  • Improved the TOTP login flow to account for the time drift
  • Added support for German, Dutch, and French languages for Windows
  • Improved performance for Windows allowslisting when collecting file information - responds 2x faster
8/18/2025

✨ New:

  • Allowlisting for Windows ARM
  • API - on-demand delegation for JIT access

💎 Improvements

  • Ensure the user fast switch is enabled during agent installation and update
  • Fix the issue of special characters in tenant display name - no longer allowing to save the display name with special characters
8/12/2025

✨ New:

  • HaloPSA integration to approve tickets with buttons
  • APIs to manage rules
  • Auto user elevation for Windows apps
  • Bulk rule deletion
  • Process tree generation in the UI

💎 Improvements

  • Allow to share desktop for shared and dedicated mode

🐞 Fixes

  • Fixed the elevation installation command for the macOS installer generation in the UI
  • Fixed the rule generation in the UI to add verified element only if more than one subject elements exist
7/30/2025

✨ New:

  • Windows allowlisting - public release
7/23/2025

💎 Improvements

  • Updated terminology from customer to tenant everywhere in admin and user portals
  • Improved tenant switcher to pull all tenants on customer tenant creation, no need to refresh the page for tenant switcher to display all tenants when new child tenant is created
  • Provide search options for all drop down lists
  • Close notification drawer on outside click
  • Added additional test cases

🐞 Fixes

  • Fixed audit chart scrolling
  • Fixed menu and close icons
  • Fixed clipboard copy for DID
6/27/2025

✨ New:

  • Real-time settings

💎 Improvements

  • Updated our APIs to return parametrized installation command in addition to returning the whole command as a string.
  • Enhanced Windows JIT login by avoiding automatic user switch on lock. No longer messing up with VPNs or user desktop settings.
  • Enhanced how we tag devices in the admin portal. Now when agent is installed with properly show servers, domain controllers, or workstations. We also properly reflect domain, local, or Entra-joined status.
  • Made an enhancement to ensure the JIT account always belongs to Administrator group. Even if membership is removed, idemeum will reassign it during next login.
  • Enhanced RFID tap-out flow to ensure card data is cleared, i.e., card hold data time elapses before disconnecting or signing out of the session.
  • Enhanced JIT flow to avoid WMI query which at times takes longer to complete.
  • Enhanced UAC capture flow to handle unverified events properly.
  • Improved log clean up.
  • Google has discontinued support for the authorization flow in Internet Explorer, so changed to a Chromium-based browser instead of the default Internet Explorer for RFID SSO.
  • Managing version.txt for RMM tools that cannot read from the registry.
  • Optimized token fetch calls by leveraging the cached token in the Update Settings flow.
  • Ensuring metadata is synced to the cloud once a day, if not updated
  • Domain JIT account login: do not fail if one or more DC is not reachable during account verification.

🐞 Fixes

  • Fixed the issue of bulk elevation mode change in the UI.
  • Fixed offline transition when DNS does not resolve the idemeum domain.
4/24/2025

✨ New:

  • Device agent status

💎 Improvements

  • Updated Immy.bot integration
  • Add an option to set up tap out mode per device for RFID SSO devices
  • Enhanced Entra JIT flows to prevent circular login issue by adding prompt=login query param to OIDC launch URL
  • Show Invited status for newly added users when local directory is used
  • Uninstall notification is now sent to device agent when the record is deleted from the cloud portal
  • We now reload credential provider settings every time you switch between default and idemeum credential providers

🐞 Fixes

  • Fixed the bug in the MSP tenant switcher when multiple tenants were selected at once
4/3/2025

✨ New:

  • Windows ARM support
  • New APIs (devices and groups)

💎 Improvements

  • Enhanced customer endpoints to return installation commands for customer tenants
  • Ddded option to change the display name for a customer tenant.
  • Now when the desktop agent is installed on Windows, there is a unique agentId that is created in the registry.
  • Updated the text and instructions in the welcome email that is received when you add / invite a new user to idemeum MSP tenant.
  • When in RFID mode and Google directory is used as a user source, we now support logins with domain shared account, in case machine is domain-joined.
  • we now support the option to delete the user from idemeum MSP tenant when the user source is Entra

🐞 Fixes

  • Fixed the issue for Entra ID admin accounts not being downgraded when Auto downgrade feature is enabled.
  • Enhanced processing the UAC events when the last logged in user is preselected.
  • Fixed the credential submission loop when auto filling credentials for Entra ID in incognito mode.
  • Fixed the issue of auto filling credentials in RFID mode when native credential provider was used.
  • Fixed macOS issue when pkg files were not properly processed in Technician mode for automatic elevation