Help Search

v4.4.0 ~ Zombie (ce)

Release date: November 7th, 2023.

Version 4.4 of the Community Edition has launched with new capabilities and improvements.

With this release, users are able to manage TOTPs directly from the browser, providing an extended TOTP experience across all their devices. They can now be created, deleted, organised and shared with others just like any other resource type.

Another highlight of this release, administrators now have the ability to suspend/unsuspend users. This new feature will offer administrators with more control over access management of their instance. By example, they will be able to prevent access to the passbolt instance for users in temporary leave, therefore enforce company policies.

Edit user dialog, mark a user as suspended fig. Edit user dialog, mark a user as suspended

And that’s not all – a number of fixes and enhancements have been implemented to improve user experience. Among them, notification emails are now aggregated in certain cases, including limiting emails when a user imports a large amount of passwords.

If you’re a system operator, please note that using older PHP versions will now trigger a healthcheck warning. Support for PHP 7.4 and 8.0 will be discontinued soon. Admins are encouraged to upgrade to PHP 8.1 or higher and use the latest version of the passbolt API.

Get the most out of passbolt – upgrade to version 4.4. Thanks for continuing to support passbolt and for being part of the community!

[4.4.0] - 2023-11-07

API

Added

  • PB-27773 As an administrator I can deny access to the mobile setup screen with RBAC
  • PB-27951 As system operator I should be warned in the healthcheck when using PHP < 8.1, as support for PHP versions 7.4 and 8.0 will soon be removed

Improved

  • PB-27948 Guest identification by their username should be case-insensitive, unless specified in configuration
  • PB-27957 Send notifications to all administrators when an administrator is deleted
  • PB-27941 Send notifications to administrators when an administrator loses its administrator role
  • PB-28171 Enable the email digest by default

Security

  • PB-28274 Fixes an XSS Security issue with mail content sanitization

Fixed

  • PB-25477 As an administrator, I should be able to recreate a user with an email that exists in the db via the command line
  • PB-27799 As an administrator installing passbolt on PostgreSQL, the database encoding should be set to utf-8
  • PB-27857 Fix help site release notes automation by adding flavour on help site release notes merge request

Maintenance

  • PB-27932 Improve code static by using cakedccakephp/phpstan
  • PB-28079 Remove deprecation warnings from the test suite

Browser extension

Added

  • PB-25204 As a signed-in user I can create a standalone TOTP
  • PB-25206 As a signed-in user I can add a TOTP to an existing password resource
  • PB-25210 As a signed-in user I can edit a standalone TOTP
  • PB-25224 As a signed-in user I can copy a TOTP
  • PB-26088 As a signed-in user I can see standalone TOTP in the quickaccess
  • PB-27600 As an administrator I want to suspend or unsuspend a user
  • PB-27601 As a sign in user I should see who is suspended in the ui
  • PB-27773 As an administrator I can deny access to the mobile setup screen with RBAC
  • PB-27898 As an administrator I should have the possibility to deny TOTP copy and preview actions with RBAC
  • PB-27949 As a signed-in user I can see password with totp in the quickaccess
  • PB-27950 As a user I can use generic OAuth2 as single sign on provider
  • [FEATURE INACTIVE] PB-28263 As a user I can see the resource expiry status
  • [FEATURE INACTIVE] PB-28265 As a user I can reset resource expiry date
  • [FEATURE INACTIVE] PB-28266 As an administrator I can enable the password expiry feature
  • [FEATURE INACTIVE] PB-28267 As an administrator I can set the email notifications of the password expiry feature

Improved

  • PB-19244 As a user with encrypted description resource type present when creating a resource using quickaccess the description should be encrypted by default
  • PB-25560 As an administrator on the admin settings pages I can see the source of information
  • PB-26002 As a user downloading my recovery kit I want to be warned about the critical character of this asset
  • PB-26086 As an administrator generating an account recovery key for my organization I want to confirm the passphrase
  • PB-26094 As an administrator having a passbolt trespassing the user limits I should see a better message
  • PB-27668 As a user I’d like to know what the numbers by the heart mean
  • PB-27922 As a user entering my passphrase I should see the entropy progressing
  • PB-28183 As administrator I want to see warnings while synchronising the organisation users directory
  • PB-28378 MFA screen should be display depending on the application

Fixed

  • PB-21625 As a user I shouldn’t see apostrophe replaced by special characters
  • PB-25279 As a user I should see in form call to action icon be well positioned
  • PB-26000 As a user updating only a resource metadata I should not update the resource secret on the API
  • PB-27784 As an administrator I should not see the account recovery enrollment twice
  • PB-27794 Fix unsupported TOTP while decrypting TOTP on webapp
  • PB-27894 As a user I should not see my username overpass the card in the login form
  • PB-27947 Fix in-form menu generate password should not override all password fields but only new password fields
  • PB-27954 Fix message after successful transfer to mobile
  • PB-28170 Fix SMTP host from Sendgrid
  • PB-28310 As a signed-in user I should not select or unselect a resource on TOTP click
  • PB-28293 As a signed-in user I should be redirected when I click on the resource url in the information panel and contextual menu

Maintenance

  • PB-26121 Improve Styleguide coverage of password policies
  • PB-27786 As a user I should not see my passphrase part of the breach if the field is empty
  • PB-27945 Update web-ext lib to v7.8.0
  • PB-27965 Upgrade node to v18
  • PB-28148 Migrate development watcher to package.json scripts
  • PB-28275 Upgrade @babel/traverse on styleguide as it has a critical security issue
  • [FEATURE INACTIVE] PB-27605 As a signed-in user I can set up Yubikey as two-factor authentication on the client (previously done on the API served application)
  • [FEATURE INACTIVE] PB-27606 As a signed-in user I can set up TOTP as two-factor authentication on the client (previously done on the API served application)
  • [FEATURE INACTIVE] PB-27608 As a user I can sign in with TOTP and Yubikey as 2FA on the client (previously done on the API served application)

Security

  • PB-25688 As a desktop app user I should sign the exported account kit with my private key
🍪   Do you accept cookies for statistical purposes? (Read more) Accept No thanks!