Release Notes 4.21.0¶
Overview¶
This document outlines the updates, improvements, and fixes introduced between versions 4.20.0 (released on Mar 09, 2026) and 4.21.0 (released on Mar 23, 2026) of the Excalibur v4 software.
New Features¶
Automated Login Macros for Web PAM Targets¶
Administrators can now record and manage login macros for Web PAM Targets, enabling fully automated credential insertion and authentication when a PAM session starts.
How It Works
- Navigate to the PAM Target detail for a Web Target.
- Use Record new macro to capture the full login process, including credential entry.
- Save the macro — it becomes part of the Web Target configuration.
- When any user starts a PAM session for that target, the system automatically replays the recorded macro, performing the login sequence and inserting credentials without manual input.
Macro Management
In the PAM Target detail, administrators can:
- Record a new macro — captures the authentication flow including all credential entry steps
- Delete an existing macro — removes the automated login configuration
Key Benefits
- Seamless auto-authentication — users are logged in automatically when a PAM session starts
- No manual credential entry — credentials are inserted through macro replay, not by the user
- Centralized control — login behavior is configured and managed per Web Target by authorized administrators
- Consistent login experience — every session follows the same recorded authentication flow
Figure 1. Record Macro from PAM Detail
Figure 2. Record Macro Session
Figure 3. Saved Recorded Macro
Enhanced Anomaly Detection¶
The detection engine has been significantly upgraded to identify unusual behavior with greater precision and reliability.
Key Improvements
- Fewer false positives — refined detection logic reduces unnecessary alerts
- More accurate alerts — improved pattern recognition for meaningful anomaly identification
- Faster identification of issues — optimized processing delivers results more quickly
- Increased confidence in detection results — higher accuracy across all monitored sessions
Improved Context Insights
Contextual information captured around detected events has been upgraded to provide richer and more actionable insights during investigation.
Benefits
- Clearer explanation of flagged events — context bubbles now provide more summarized reasoning for why an anomaly was detected
- Better visibility into surrounding activity — expanded capture window shows more relevant session context
- More actionable information during investigation — investigators can make faster, better-informed decisions based on enriched event data
Figure 4. Context Bubble
Automatic Recording Cleanup on Tenant Deletion¶
When a tenant is deleted — whether via force delete or final hard delete after decommission — all associated recording files are now automatically removed from the recording directory volume as part of the deletion process.
Previously, tenant database entities were removed during deletion, but recording files could remain on disk, resulting in orphaned data, increased storage usage, and potential data retention compliance issues.
What Changed
- Recording files are now deleted from the recording directory volume when a tenant is force-deleted or hard-deleted after decommission
- No orphaned data on disk — ensures complete cleanup of all tenant-related data
- Reduced storage usage — eliminates leftover recording files that previously required manual cleanup
- Improved data retention compliance — tenant data removal now covers both database entities and recording files
Clickable QR Codes for Mobile Authentication¶
A new streamlined mobile login flow has been introduced using clickable QR codes on the dashboard.
How It Works
- Open the dashboard on a mobile device.
- Tap the QR code displayed on the login screen.
- The mobile app opens automatically.
- A confirmation popup is displayed — tap Continue to proceed.
- The authentication action starts automatically, allowing you to log in to the dashboard on your mobile device.
This feature simplifies the mobile authentication experience by eliminating the need to manually scan QR codes, reducing login steps and improving usability on mobile devices.
Figure 5. QR Code Mobile Authentication
Detailed Device Integrity Information¶
The device integrity model has been enhanced to provide full transparency into why a device is considered trusted or untrusted. Instead of a simple trusted/untrusted indicator, the system now captures and displays detailed integrity information from Android and iOS platforms.
What's New
Android Devices
The dashboard now shows specific integrity details including:
- Whether the app is recognized and genuine
- The device integrity level
- App licensing status
iOS Devices
- Confirmation of successful device attestation
- A clear reason when attestation fails
Dashboard Enhancements
- Token Detail — view detailed integrity information for each registered device
- Action Detail → Validation Result — see the integrity state that was valid at the time of each action
- Audit Log — track all changes to device integrity status with full before/after history
Key Benefits
- Full transparency — understand exactly why a device is trusted or untrusted
- Better investigation support — detailed integrity data helps during forensic analysis
- Complete audit trail — all integrity changes are recorded and visible
- Action-level visibility — verify the device integrity state at the time of any action
Note
On iOS, attestation provides a pass/fail result with a failure reason. On Android, certain device details such as OS version or patch level are not provided by the platform. If communication with the integrity service is temporarily unavailable, detailed attributes may not be shown.
Figure 6. Android Integrity Check
Figure 7. iOS Integrity Check
Usability Improvements¶
Automatic User Synchronization in the Mobile App¶
The mobile app now automatically detects when a user has been deleted from the system and removes them from its internal user list. Previously, deleted users could remain visible in the app, leading to confusing error messages and inconsistent behavior when attempting operations with those users.
What Changed
- The mobile app actively synchronizes its user list with the identity store
- When a user is deleted via the dashboard, the change is reflected in the app automatically
- Eliminates stale user data that previously caused misleading error messages
Key Benefits
- Consistent behavior — the app accurately reflects the current state of the system
- No more misleading errors — operations involving deleted users are handled cleanly
- Improved reliability — administrators can confidently manage users knowing changes propagate across all components
Account Detail View in the Mobile App¶
A new Account Detail screen has been added to the mobile app. Tapping any user row in the registered accounts list now opens a dedicated detail view with full account and certificate information.
Account Information
- User name and email address
- Copy-to-clipboard option for the email address
Certificate Details
- Common Name (CN)
- Issuer
- Validity dates (from / to)
- Serial number
- Color-coded validity status (valid, expiring soon, expired)
Account Removal
- A Remove Account button is available at the bottom of the detail screen
- Triggers the same confirmation flow as the existing delete icon on the accounts list
- Provides a clear, focused context for self-service account management
Figure 8. Token User Detail







