We are very excited to be sponsoring MSPGeekCon this year. If you are planning to attend, please stop by our booth, and we would be happy to hear more product feedback and talk about our new big upcoming launches.
Big thanks to Elastic IT and Anthony Birone for guiding and helping us to improve the Immy Bot integration. We now added a new catalog integration in Immy that is very simple to set up, and comes preconfigured out of the box. It relies on API integration between Immy and idemeum, allows to map customer tenants, and shows the idemeum badge for each computer where the agent is installed.
Idemeum now keeps track of each device agent by recording the last check-in time to display the agent health status. Every time idemeum desktop agent checks in with the cloud, the time stamp is captured and the health status is updated. You can now clearly see in the Devices section what agents are healthy and which ones have not communicated with idemeum for a while.
Add an option to set up tap out mode per device for RFID SSO devices
Enhanced Entra JIT flows to prevent circular login issue by adding prompt=login query param to OIDC launch URL
Show Invited status for newly added users when local directory is used
Fixed the bug in the MSP tenant switcher when multiple tenants were selected at once
Uninstall notification is now sent to device agent when the record is deleted from the cloud portal
We now reload credential provider settings every time you switch between default and idemeum credential providers
Windows ARM support
We now support workstations with Windows ARM processors. There is nothing to do from your end, simply install idemeum agent with Windows PowerShell command, it will automatically detect the architecture, and will install required pre-requisites and idemeum executable.
API changes
Made a number of changes to our existing public API endpoints, as well as enhanced the existing ones. Check our API docs page.
New Devices endpoint to return information about devices along with metadata and installation commands
New Groups endpoint to get information about all idemeum groups
Enhanced Customer endpoints to return installation commands for customer tenants
Enhancements
Display name change - added option to change the display name for a customer tenant. Access admin portal → Customers → select customer → click on ... and choose Edit. Now when editing you can change the display name for a customer tenant.
Desktop agent ID - now when the desktop agent is installed on Windows, there is a unique agentId that is created in the registry. You can obtain this agentId for each device from idemeum API, and then correlate with each endpoint to see if the agent is installed.
Welcome email enhancements - updated the text and instructions in the welcome email that is received when you add / invite a new user to idemeum MSP tenant.
Shared domain account support when Google used as user source - when in RFID mode and Google directory is used as a user source, we now support logins with domain shared account, in case machine is domain-joined.
Delete user when Entra ID is user source - we now support the option to delete the user from idemeum MSP tenant when the user source is Entra. Simply click on ... next to the user record and delete the user.
Bug fixes
Fixed the issue for Entra ID admin accounts not being downgraded when Auto downgrade feature is enabled.
Enhanced processing the UAC events when the last logged in user is preselected.
Fixed the credential submission loop when auto filling credentials for Entra ID in incognito mode.
Fixed the issue of auto filling credentials in RFID mode when native credential provider was used.
Fixed macOS issue when pkg files were not properly processed in Technician mode for automatic elevation
Unified script deployment
Big exciting update for us! We have now unified the deployment for Windows agents (macOS will be added soon). You can now use one installation script and pass it the desired customer name with the -customerName attribute. The agent will automatically associate with the appropriate customer tenant, and if the customer does not exist in idemeum, it will be automatically created.
Installation is now migrated from EXE to MSI in order to improve reliability of integrations with deployment tools. We automatically handle required prerequisites when installing with command-line script.
Unified deployment with a command line script is documented below.
As we now have the simpler way to deploy idemeum agent and automatically create customer tenants, we tested and verified the following integrations with RMMs. Most of these integrations are using the built-in customer name variables that get automatically passed to idemeum script for installation.
We have added the option to configure proxy for idemeum agent when Windows agent is installed with PowerShell script. You can simply pass the -proxyHost and -proxyPort attributes to the PowerShell installation command. The documentation for proxy configuration is below.
Starting from this current version (Windows 1.8.0) you will be able to install the desired version of idemeum desktop agent by passing it the -version attribute.
Duo integration - auto registry changes
Previously when idemeum agent was installed on the workstations with Duo, manual registry modifications were necessary to make both products work together. What is more, Duo would often update the registry keys and idemeum credential provider would not be display.
We have now simplified the integration and there is nothing you need to do when idemeum is installed on machines with Duo. We manage registry keys automatically.
We now support removing manually added domain user accounts from local administrator group on domain-joined workstations. When these accounts are added manually, idemeum discovers them and can downgrade from the cloud.
We updated the UI for account discovery page and we now show the workstation type for convenience (local, domain-joined, domain-controller)
Spanish locale support
We have started the support for various languages to make sure JIT and elevation work correctly on machines with different languages. We have now added support for Spanish language. For this feature to work properly the workstation needs to have Spanish set up as locale.
Additional enhancements
Improved the Groups page to show group types (local, built-in, external) and consolidated actions under .... Now it is very easy to view group members by choosing one of the actions from ....
Improved the Customers page to show the separate column for groups that are delegated to each customer tenant. By clicking on the counter you can access the delegation window.
QR-code expiry in Technician mode made independent of client time i.e., when client time is not in sync.
Tenant switcher
We have significantly simplified the navigation between customer environments. No need to manage multiple tabs anymore - everything opens in the same windows, and we no offer the tenant switcher at the top left of the window to search for any customer environment and navigate there. Tenant switcher is available for both user and admin portal.
Hybrid Entra ID JIT support
Idemeum now supports just-in-time access to Hybrid Entra ID deployments. We can now automatically handle the cases where JIT MSP accounts that get created on domain-controllers get synced to Entra ID. When requesting JIT account for Entra ID and there is an account that got synced from on-premises, idemeum will automatically handle this case and create a cloud only account. There are no changes and configuration required - everything is handled automatically.
Global elevation requests on mobile
Now you can see all elevation requests on mobile across all your customers aggregated in one place. This feature is available to users who are MSP admins. Open idemeum mobile app → navigate to MSP dashboard and you will see the requests menu at the bottom. It aggregates all requests across all customers.
Configurable OU for JIT computer accounts
You can now configure where you would like to create JIT computer accounts for Windows domain environments. You can specify an OU or a set of nested OUs where you would like idemeum to create JIT MSP accounts. If the OU is not present, idemeum will create one for you.
With idemeum you can now onboard your customer admins and allow them to login to company workstations with JIT co-managed account, manage elevation requests from users, and access LAPS credentials. Simply onboard the user into a customer tenant with a mobile app, and the rest will be handled automatically. What is more, this feature does not use any technician JIT licenses, feel free to onboard as many co-managed users as necessary.
You can now control what users and groups can access what customer workstations. For instance, when you onboard a new tech and delegate access to a customer tenant, you might limit the JIT access to only customer workstations and not domain controllers. You can configure workstation access control with groups or direct user assignments.
Auto update - macOS agent now supports auto-update. The agent will periodically check if there is a new version available and will silently update the dekstop agent.
Timer bug fix - fixed the issue where when time was set to 0, it was going into the endless loop.
Improvements and fixes
Key management improvements - we improved how encryption keys are managed and passed when you login between customer tenants, and use various surfaces including iFrame for PSA integration, browser and extension.
Allow EPM approvals in read-only delegation mode - now when technician is delegated to customer tenants with read-only mode, we also allow technician to approve elevation requests.
Technician mode audit logging - we now capture the technician mode event and generate an audit log record when one of your techs initiates Technician mode on the workstation. We generate the following record:
nik@nikpot.com initiated technician session (Technician mode) on the Desktop JIT-W11-LOCAL for the user account mike.
Bug fix: group delegation after user disabled - fixed the issue where the user was not properly delegated to customer tenants as part of group, when the user record was first disabled and then enabled back.
Cosmetic UI clean up - cleaned up the UI to create more clear titles, fixed broken documentation links, and reorganized menus for easier navigation.
ConnectWise PSA integration
Excited to announce idemeum integration with ConnectWise PSA. When users request elevations on Windows and MacOS workstations, idemeum can now open tickets in your ConnectWise PSA. The ticket contains all request metadata along with the option to approve or deny the request.
We made some cosmetic updates to our login page to make it cleaner.
Technician mode
With the latest Windows and MacOS agent release we are introducing the Technician mode. Long-awaited feature that has been asked by a lot of our customers. You can now troubleshoot customer workstations without the need to be logged in with admin account. Simply launch Technician mode application, scan the QR-code with idemeum app and approve with biometrics. The default 10-minute timer will start and you will be able to bypass any elevation rules.
We are excited to release the first iteration of our public APIs. We spent the last several weeks working on exposing our platform programmatically while still maintaining our cloud to be zero-knowledge. When you create an API key, that API key is not only used for authentication, but also to perform crypto operations. Even when interacting with idemeum platform over API you get the strong level of security where your data is encrypted with your own key.
We have documented our initial set of endpoints here → api.idemeum.com
We are looking for your feedback for what additional endpoint you will need. Please reach out to us at support@idemeum.com.
Windows Desktop Agent 1.7.2
Support for -credentialProviderEnabled flag in PowerShell command. If you prefer to install idemeum agent without credential provider, use this flag with True variable. Idemeum will install without credential provider, and you will be able to use the following features:
LAPS
Account discovery and management
MacOS Desktop Agent 1.1.2
We have released a number of improvement for MacOS:
Fixed the issues related to black screen appearing when in sleep mode. Now we handle the user / technician switching in a more reliable way.
We now support the application installations when they are performed by moving the app to the application folder. Before the elevation prompt would come up only when you launch the app directly. Right now, even if you move an app to the app folder, idemeum will trigger the elevation request.
Fixed the metadata that was captured for executables on MacOS, including publisher certificates and certificate attributes.
Integration with Hudu
We are now releasing LAPS integration with Hudu. Idemeum agent can create break-glass accounts on Windows and MacOS workstations and rotate passwords every 24 hours. These credentials are available in the cloud portal and mobile app. Now with this integration, idemeum can push credentials to Hudu. Integration is very easy to set up, idemeum will map customers automatically, and will start uploading the credentials. Hudu integration requires the latest idemeum clients.
With idemeum you can automatically downgrade local admin accounts on workstations. When this feature is enabled at the customer tenant level, idemeum desktop agent will enumerate all local admin accounts on workstation and downgrade the ones that are not on the exclusion list.
We now publish our public roadmap. Not only can you see what we are currently working on, but you can also create feature requests and tell us how we can make our platform better.
JIT account enable/disable handled from RDP sessions
UAC settings enabled to prompt credentials on secure desktop
Enhanced elevate as Admin to ignore AD bind errors during elevation
Windows Desktop Agent 1.7.0
Support to configure http client timeouts for workstations connected to slow network (applicable during fresh install)
UAC path resolution fix for exe files launching from folders having CLSID as part of the folder name
Support to skip session disconnect (behind a knob) to avoid discrepancies wrt Sleep events
Windows Desktop Agent 1.7.1
Enhanced offline mode for MSP technicians
MacOS Desktop Agent 1.1.1
Enhanced application of elevation rules for sudo (Terminal)
Other fixes
Fixed the resizing issue on the Devices screen
Windows Desktop Agent 1.6.8
Hudu integration support for LAPS credentials
Windows Desktop Agent 1.6.7
Fixed the issue of desktop not being removed from the cloud when uninstalled
Show the proper message to technician when domain login mode is enabled, but the idemeum agent is not installed on domain controller
Enhanced log collector to capture events when log fetching is denied by the Group Policy
Remote Desktop (RDP) with JIT accounts
When idemeum desktop agent is installed on domain-joined workstations, technicians can RDP from one machine to the other without the need to use any passwords - simply scan the QR-code and approve with biometrics.
Just-in-time accounts will be used behind the scenes - accounts will be enabled / disabled on-demand, and passwords will be rotated after each login.
You can now connect HaloPSA instance to idemeum, and idemeum will be able to create and close tickets when users are requesting elevated privileges on endpoints. The integration is very simple to set up, and when connected, idemeum can automatically map customers in HaloPSA to idemeum customers, or you can do this manually.
When the ticket is created, all elevation metadata is attached in the tickets details along with the link for tech to quickly approve or deny the request.
To set up this integration, please check the documentation guide below.
With the latest cloud and idemeum mobile application release you can now choose what type of elevation to use when approving user requests - admin or user elevation. With admin elevation you approve the request with the idemeum admin account, whereas with user elevation you temporarily elevate user account to run the program in the user context.
Reorganized and simplified the UI for both admin and user portals in order to improve the ease of navigation
Enhanced the Entra ID authorization connector to handle refresh token correctly when the password changes for the account that was used for authorization
Enhanced Entra ID LAPS feature to always provision LAPS accounts on onmicrosoft domain based on Microsoft best practices
Global elevation rules
You can now create global rules that will control elevation requests across all your customers. There are several ways you can create these rules:
Manually in your MSP tenant
Automatically generate global rule from elevation event or user request in your customer tenant
On the mobile app when you approve the request you can automatically generate a global rule
We now aggregate all elevation requests across all customers in your MSP tenant. You can now approve / deny all these requests from one central location.
When you install idemeum agent you can now pass an additional parameter to automatically set up elevation mode right after installation - offline, audit, or rules.
We now removed the dependency on RFID readers from rfIDEAS, and we can now support pretty much any key stroking reader. This significantly expands the options and lowers the cost of initial hardware investment.
Additional enhancements
MacOS 1.0.9 - Ability to upload logs to idemeum cloud when requested from the admin portal
MacOS 1.0.9 - Block QR code access with the message for non Technicians during elevation
MacOS 1.0.9 - Timezone correction in logs
MacOS Desktop Client 1.0.9
Support for user elevation vs. admin elevation
Configurable elevation timer and elevation message
MacOS Desktop Client 1.0.8
Elevation mode can be set as part of installation command
Show a relevant error message when non-technician scans the QR-code during elevation request
Ability to upload logs to the cloud when requested from admin portal
Timezone correction in logs
Windows Desktop Client 1.6.1
Added option to approve elevation and elevate as user vs. admin. Now you can choose how to elevate the user request. Supported for local and domain-joined workstations only (No Azure AD users).
Support for configurable elevation timer and elevation message.
Windows Desktop Client 1.5.9
For new installation you can set the elevation mode with the PowerShell script option - elevationMode
RFID Single Sign-On - we can now support any keystroking reader
Windows Dekstop Client 1.5.8
Resolved all the incidents related to Windows Defender
RFID Single Sign-On - credentials mode set as default. No longer supporting ADCS.
RFID Single Sign-On - feature added to disable same card tap out controlled by a knob
RFID Single Sign-On - enhanced tap-over from lock screen when logged in using default credential provider
Major September Release
Group-based delegation to customer tenants
We introduced the feature to control access to customer tenants with user groups. You can now create groups, assign techs to these groups, and delegate access to customer tenants with user groups. You can read more about the feature here:
We now provide an option to deploy idemeum agent across your customers with one RMM script. We allow to download all customer tenant deployment variables with CSV file, you can then assign these variables to customers in your RMM, and use one script for deployment. The script will pull the variables from the organization and deploy appropriate agent configuration.
As an example, here is how to deploy windows agent with Ninja RMM.
You can now view all aggregated audit logs in your MSP tenant. In addition to seeing all activity in your MSP tenant, you can view all activity across your customers.
LAPS credentials on mobile
LAPS credentials are also pushed to idemeum mobile application and can be viewed by any technician who has access to LAPS credentials.
We now expose an API to disable Entra ID JIT accounts on demand. This is helpful when you want to automate Entra ID account enable / disable when your PSA tickets are closed.
Fixed the issue when idemeum agent was interfering with RDS application launch
Launch Entra ID JIT accounts in incognito mode when idemeum is integrated with PSA using iFrame
Enhanced handling JIT account management errors on Windows
macOS desktop client 1.0.7
Wanted to share an update on the new MacOS agent that we released:
We now support silent installation of idemeum desktop agent with MDM profiles. If you manage your Macs with MDM, you can silently push idemeum agent and also silently enable privacy & security settings (Full disk access, and Accessibility) so that manual intervention is not needed.
As an example we documented how to deploy idemeum desktop agent with Intune.
Properly display long names in the elevation pop up
Clean up old logs from the logs folder
Improved stability of elevation mode configuration from the cloud. It no longer relies on notifications.
Windows Desktop Client 1.5.7
With the default installation of Windows client we no longer require restart. Once the installation is complete, the sign out is required to load the idemeum credential provider.
Enhanced offline detection, especially for virtual environments
When idemeum desktop client is installed we are leveraging Advanced Installer, and the installation PowerShell scripts are no longer run from the temp folder. Instead, these scripts are executed as part of silent installation process by idemeum app. This enhancement makes it easier to use idemeum with security tools such as ThreatLocker.
Windows Desktop Client 1.5.6
Fix for RDS applications launch when idemeum desktop client is installed
On the login screen in JIT mode we no longer show MSP admin accounts for local workstations
Support to consider remote domain name for domain-joined workstation when RFID Single Sign-On is used
For technician mode the issue of QR-code timing out after 3 seconds is fixed
Enhanced how accounts are synced for Account Discovery (not pushing built-in and idemeum managed accounts)
macOS desktop client 1.0.5
Account discovery and management support
Fixed lock screen issue where the screen was turning black after sleep
Support added to work with default security agent like Xcreds
Windows Desktop Client 1.5.5
Support for privileged account management discovery
Support the use case when the workstation type is changed from local to domain-joined after the idemeum desktop client installation
Domain controller check optimized & managed users having passwordnotrequired property set as false
Major August Release
We are excited to announce the release of several new features that we have been working on for the last several weeks.
LAPS for Entra ID accounts
You can now secure Entra ID emergency accounts - automatically create up to two break-glass accounts for any customer Entra ID tenant, upload credentials to zero-knowledge password vault, rotate passwords automatically every 24 hours. Idemeum now offers unified LAPS - for computer accounts as well as Entra ID accounts.
You can now control who has access to emergency LAPS credentials. Create groups in your MSP tenant, assign technicians to various groups, and then decide which groups of techs can view Entra ID or computer LAPS credentials.
You can now configure what roles are assigned to technicians when they request Entra ID accounts. For instance, Techs Level 1 will get Global admin role, whereas Techs Level 2 will get User admin role. Simply create groups in your MSP tenant and leverage these groups when configuring Entra JIT accounts.
There are several ways you can allow your technicians to access customer tenants - you can make a technician a Global admin to access all customer tenants, or delegate admin access to only specific customer tenants. We are now introducing a Read-only administrator role so that technician can access the customer tenant, view the settings, but not make any configurations or changes.
We enhanced our MSP portal navigation. Now you can see how many technicians have access to each customer tenant as well as the role that each technician was assigned.
Enhanced MSP logins irrespective of secure token status
Enhanced notification to perform operations in the background i.e., when user session is not established
macOS desktop client 1.0.3
Added listener to perform auto-upgrade from the cloud dashboard
Enhanced LAPS account password policy to support password length
Elevation support for additional menus (Fingerprint, Profile Add/Remove, Passwords)
Windows Desktop Client 1.5.4
Introduced the elevation control for admin users logged into the workstation. When admin user needs to perform privileged action, idemeum will also intercept UAC in rules mode and will prompt the user to request execution. Check the updated Windows behavior for EPM below.