The Inverse team is pleased to announce the immediate availability of PacketFence 12.1 - a major release bringing tons of improvements!
Single-Sign-On for the admin interface
The PacketFence admin interface now has support for Single-Sign-On (SSO) using SAML, OAuth2 as well as supporting MFA using TOTP and Akamai MFA.
Fingerbank in the PacketFence Connector
The PacketFence Connector now supports running the Fingerbank Collector to perform device profiling using all the traffic a PacketFence connector sees.
Unbound dynamic PSK support for OpenWiFi
The OpenWiFi integration now supports dynamic unbound PSK which allows individual users to authenticate against PacketFence with their personal WPA2 key.
Here’s the complete list of changes included in this release:
New Features
Added unbound dynamic PSK support to the OpenWiFi module
Added Single-Sign-On capability for the admin interface login (SAML/OAuth/MFA/etc)
Improved PacketFence forwarder integration to mirror DNS packets from a Windows DNS server
Support for the Fingerbank Collector on the PacketFence Connector
Enhancements
More flexibility in the definition of the RADIUS servers in an Eduroam source
Allow to import only DB or configuration during import
Debian package for PacketFence Connector
Removed the savedsearch table.
Removed jQuery dependency in captive portal.
Present the dynamic PSK on the status page when appropriate
Manage pfconfig.conf through upgrade scripts instead of packaging
Improve WebAuth support on Extreme controllers
Allow users to upload files from the admin instead of uploading them manually via SCP/SSH
Added new radius attribute vpn detection for fortigate
Fixed valid_mac that identify some ip address as mac
Support for hardware token like yubikey for Akamai MFA
Added sms/phone call as default method in configuration
Bug Fixes
Fixed issue with pfconnector where it would reuse a dynamic reverse that isn’t active anymore (Pfconnector server active dyn reverse cache checks can fail #7218)
Fixed RADIUS deauth through pfconnector-remote in a cluster where it was logging as failed although it succeeded
When a rule match is ‘any’ and has no conditions the rule is always successful (#3768)
Fix issue with database upgrade (#7283)
Fix issue Sponsor registration: notes field can’t be used on captive portal #6385
Better error handling when performing a deauth on the previous switch. (captive portal redirect page return Caught exception in captiveportal::Controller::Root->dynamic_application “Can’t use string (“0”) as a HASH ref while “strict refs” in use at /usr/local/pf/lib/pf/enforcement.pm line 206 #6985)
Fixes possible Clickjacking for netdata reverse proxy (#7338)
Don’t resync config files unnecessarily during restarts (Cluster resync on restart - pf12.1 #7360)