Skip to content

Commit

Permalink
reword Kerberos
Browse files Browse the repository at this point in the history
Co-authored-by: Jens L. <jens@goauthentik.io>
Signed-off-by: Simonyi Gergő <28359278+gergosimonyi@users.noreply.github.com>
  • Loading branch information
gergosimonyi and BeryJu authored Oct 28, 2024
1 parent a708727 commit 6224f7d
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion website/docs/releases/2024/v2024.10.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ To try out the release candidate, replace your Docker image tag with the latest
- **Chrome Device Trust** <span class="badge badge--primary">Enterprise</span> <span class="badge badge--info">Preview</span>: Verify that your users are logging in from managed devices and validate the devices' compliance with company policies.
- **FIPS/FAL3 for FedRAMP "very high" compliance** <span class="badge badge--primary">Enterprise+</span>: with support for SAML encryption and now JWE (JSON Web Encryption) support, authentik can now be configured for FIPS compliance at Federal Assurance Level (FAL) 3.
- **Captcha on Identification stage**: Run a CAPTCHA process in the background while the user is entering their identification.
- **Kerberos source**: authentik can now integrate with existing Kerberos environments by allowing users to log in with their Kerberos credentials or SPNEGO or syncing users into authentik.
- **Kerberos source**: authentik can now integrate with existing Kerberos environments by allowing users to log in with their Kerberos credentials, SPNEGO or syncing users into authentik.

## Breaking changes

Expand Down

0 comments on commit 6224f7d

Please sign in to comment.