Skip to content

Release Notes 4.11.0

Overview

This document outlines the updates, improvements, and fixes introduced between versions 4.9.0 (released on Jun 23, 2025) and 4.10.0 (released on Jul 28, 2025) of the Excalibur v4 software.


New Features

Tunnel Client Proxy Configuration Support

Added support for proxy configurations in the Tunnel Client. This enhancement enables the client to route all control and data channel connections through a specified proxy server. It's particularly useful for environments where internet access is restricted and must go through a proxy.

Key Benefits

  • Enables Tunnel Client to operate in restricted network environments
  • All outbound connections (control + data) are now proxy-aware
  • Helps ensure compliance with strict network policies

Enhanced Audit Logs

Our enhanced auditing features provide deeper visibility into critical activities, strengthening security, improving compliance, and delivering a more intuitive user experience.

Invitations

You can now access relevant User Audit Logs directly from the Invitations page. Simply click on the email (of the invited user) or the invited by field (invitation creator) to navigate to their User Audit Detail in the Audit Logs section.

image

Figure 1. Invitation Audit Logs

PAM Target

Added more detailed information. An audit log is also created whenever a user performs any of the following 3 actions:

  • Downloads a file
  • Downloads a session recording
  • Uploads / downloads files within session

image

Figure 2.PAM Target Audit Logs

PAM Target Groups

Track changes and activities related to privileged access management targets.

image

Figure 3.PAM Target Group Audit Logs

User Groups

Monitor modifications and actions performed on user groups.

image

Figure 4. User Group Audit Logs

Passkeys

Introduced detailed audit logging.

image

Figure 5. Passkeys Audit Logs

Token

Added more detailed information.

image

Figure 6. Token Audit Logs

Tunnel

Introduced new audit log section.

image

Figure 7. Tunnel Audit Logs

Rule Sets

Introduced new audit log section.

image

Figure 8. Rule Sets Audit Logs

Security Policies

Introduced new audit log section.

image

Figure 9. Security Policy Audit Logs

Geofences and Geofence Groups

Introduced new audit log section.

image

Figure 10. Geofence Audit Logs

image

Figure 11. Geofence Group Audit Logs

SAML-Initiated Login Support

You can now log in directly to service providers from the interface

  • A new Login button has been added next to each service provider
  • If login isn’t available for a service provider, you’ll see a helpful message explaining why

Also, users can now authenticate to SAML using passkeys.

This update makes it quicker and more convenient to access your connected services.

image

Figure 12. New Login Button

image

Figure 13. Setting To Enable / Disable Logging In Via The Button

Support for Modern Email Authentication Methods

We’ve expanded our email configuration options. Previously, only SMTP with username/password was supported. Now, enterprise users can connect to services like Microsoft Exchange (with modern authentication) and Gmail (using OAuth2).

  • Choose your preferred authentication method during setup or from the administrator dashboard
  • Easily provide the required credentials specific to each method

This update ensures greater flexibility and compatibility with enterprise-grade email providers.

image

Figure 14. Email Configuration Options


Usability Improvements

Improved Service Provider Group Table

Selected Service Providers are now displayed directly in the group table, allowing for quicker visibility without needing to open each group.

image

Figure 15. Service Provider Group Table show all selected Service Providers

…and more minor fixes and improvements