<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>AuthPoint - Product Enhancements — WatchGuard Community</title>
        <link>https://community.watchguard.com/watchguard-community/</link>
        <pubDate>Mon, 13 Apr 2026 23:44:47 +0000</pubDate>
        <language>en</language>
            <description>AuthPoint - Product Enhancements — WatchGuard Community</description>
    <atom:link href="https://community.watchguard.com/watchguard-community/categories/authpoint-product-enhancements/feed.rss" rel="self" type="application/rss+xml"/>
    <item>
        <title>Authpoint authentication additional features</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4541/authpoint-authentication-additional-features</link>
        <pubDate>Tue, 24 Feb 2026 18:40:50 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>PMEAdmin</dc:creator>
        <guid isPermaLink="false">4541@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>When I go to monitor authpoint, then authentication, I see my list of users. When I click on a user I get the date/time, token number, type, resource, status. How about adding more to the list and maybe give us a customizable list to include/exclude things. Add to the list like Computer Name, IPv4/6 Address, operating system, architecture, logon app version, last time connected, if a user is connected to multiple systems at one time.</p>
]]>
        </description>
    </item>
    <item>
        <title>Announcing the WatchGuard Idea Portal</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4405/announcing-the-watchguard-idea-portal</link>
        <pubDate>Thu, 18 Sep 2025 00:54:56 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>james.carson</dc:creator>
        <guid isPermaLink="false">4405@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>WatchGuard community users and customers,</p>

<p>We've listened to your feedback about product enhancement requests and have been hard at work to provide you with a better system.  The WatchGuard Idea Portal allows you to submit ideas directly to our Product Management team and receive feedback on your requests.</p>

<p>You can navigate to the Idea Portal by logging into WatchGuard Cloud.  <a href="https://cloud.watchguard.com" rel="nofollow">https://cloud.watchguard.com</a></p>

<p>-Click the question mark at the top right of the page and select Give Feedback.<br />
-The idea portal will load and allow you to make submissions for new ideas or upvote existing requests.</p>

<p><img src="https://us.v-cdn.net/6029905/uploads/editor/ix/iy7h6gnvvgl3.png" alt="" title="" srcset="https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=300, width=300/6029905/uploads/editor/ix/iy7h6gnvvgl3.png 300w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=600, width=600/6029905/uploads/editor/ix/iy7h6gnvvgl3.png 600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=800, width=800/6029905/uploads/editor/ix/iy7h6gnvvgl3.png 800w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1200, width=1200/6029905/uploads/editor/ix/iy7h6gnvvgl3.png 1200w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=1600, width=1600/6029905/uploads/editor/ix/iy7h6gnvvgl3.png 1600w, https://us.v-cdn.net/cdn-cgi/image/quality=80, format=auto, fit=scale-down, height=2000, width=2000/6029905/uploads/editor/ix/iy7h6gnvvgl3.png 2000w, https://us.v-cdn.net/6029905/uploads/editor/ix/iy7h6gnvvgl3.png" sizes="100vw" /></p>

<p>Thank you,</p>
]]>
        </description>
    </item>
    <item>
        <title>Pause in MFA for a certain period (example 8 hours)</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4385/pause-in-mfa-for-a-certain-period-example-8-hours</link>
        <pubDate>Fri, 29 Aug 2025 15:37:12 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>Timb551</dc:creator>
        <guid isPermaLink="false">4385@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi, would like to request a feature.</p>

<p>We are looking to move from Duo and have found from testing that there is no option to pause mfa checks for a certain period.  For example we have it set at 12 hours so it will only ask once at the start of your work day and will only ask again if you move networks.</p>

<p>I appreciate there are network locations you can set as approved but this wont work when home working etc.</p>

<p>thanks</p>
]]>
        </description>
    </item>
    <item>
        <title>Obtain internal IP address (not public) when applying policy for Omnissa VDI</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4369/obtain-internal-ip-address-not-public-when-applying-policy-for-omnissa-vdi</link>
        <pubDate>Tue, 05 Aug 2025 00:56:36 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>bmccorkle</dc:creator>
        <guid isPermaLink="false">4369@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>We've integrated AuthPoint with our Omnissa UAG server so external users need to MFA but internal users do not.   We also installed the AuthPoint Login App on the VDI clients themselves.  What I'd like to have happen is allow certain AuthPoint groups to bypass MFA when logging into the VDI clients internally from a private subnet (using network locations created in the 'Policy Objects' area).  However, it seems AuthPoint is only obtaining the public IP address users login from when determining which policy to apply.</p>

<p>Is AuthPoint able to be able to get the local IP from the VDI Blast Protocol, or is it planned?  I also tried allowing the desktop pool to use RDP with the same result.</p>
]]>
        </description>
    </item>
    <item>
        <title>Support for OpenID Connect</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/948/support-for-openid-connect</link>
        <pubDate>Thu, 23 Apr 2020 00:17:52 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>Jaz</dc:creator>
        <guid isPermaLink="false">948@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I've been using AuthPoint with Azure Active Directory and it's working very well.<br />
Recently I wanted to enable external authentication for ConnectWise SSO but found it only supports OpenID Connect  which AuthPoint doesn't support.</p>

<p>So I wasn't able to make ConnectWise SSO work directly with AuthPoint.</p>

<p>As a work around I was able to make ConnectWise SSO use Azure Active Directory for external authentication, it works but its a bit convoluted.</p>

<p>The flow is like this, user navigates to ConnectWise SSO (from another ConnectWise product) &gt; enter username &gt; then redirect to Azure Active Directory &gt; enter user name a 2nd time &gt; then redirect to WatchGuard AuthPoint &gt; enter user name a 3rd time &gt; then authenticate and redirect back to AAD then redirect back to ConnectWise SSO.</p>

<p>Would be great if support for OpenID Connect could be added.</p>

<p>Also a side not, would be great if AuthPoint was able to somehow pickup the username when being redirected during SP initiated sign on, so that we only had to enter the username once. (e.g already populated on the AuthPoint login page), not sure if thats possible though, just a thought.</p>
]]>
        </description>
    </item>
    <item>
        <title>Policy to automatically inactivate users not logged in with x days</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4249/policy-to-automatically-inactivate-users-not-logged-in-with-x-days</link>
        <pubDate>Wed, 26 Mar 2025 19:58:21 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>DanDemers</dc:creator>
        <guid isPermaLink="false">4249@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I believe it would be beneficial to have the ability to create a policy where an auth point could disable users after x days of inactivity.</p>

<p>It seems like it would be trivial to add such a feature and help customers lock down their environments without spending a lot of extra time manually performing this task.</p>
]]>
        </description>
    </item>
    <item>
        <title>Can we please have access to user Login data?</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4247/can-we-please-have-access-to-user-login-data</link>
        <pubDate>Tue, 25 Mar 2025 19:51:16 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>DanDemers</dc:creator>
        <guid isPermaLink="false">4247@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I was shocked this week when I went to see how to export the last login date for users, and it wasn't possible. I literally needed to run a report, copy the website, and paste it/manipulate it within Excel.</p>

<p>Seems to me that it would be basic functionality to be able to export the list of users to CSV and that the list would include details such as last login date.</p>
]]>
        </description>
    </item>
    <item>
        <title>AuthPoint - Office 365 integration</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1190/authpoint-office-365-integration</link>
        <pubDate>Wed, 19 Aug 2020 23:02:14 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>Tristan.Colo</dc:creator>
        <guid isPermaLink="false">1190@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I understand the limitation from Microsoft, but is there anyway we can add the ability to whitelist accounts from MFA on the SAML on the cloud portal just like logon app? Especially while Microsoft does not have a date as to when they will allow Authpoint as either a Conditional Access tool or something else.... I understand Microsoft is pushing you to the wall but there has to be something done about this stiff limitation of "all or nothing" when it comes to Authpoint's current 365 integration and it completely undoes the simplicity of the DUO setup.</p>

<p>There are certain things like Teams Rooms that don't support MFA at all that need to be whitelisted in order to work... I understand we could use ADFS to filter by groups but that doesn't work very well when your internal Domain is different from the public one....</p>

<p><a href="https://docs.microsoft.com/en-us/microsoftteams/rooms/rooms-authentication" rel="nofollow">https://docs.microsoft.com/en-us/microsoftteams/rooms/rooms-authentication</a></p>

<p>"MFA isn't supported regardless of the topology you have."</p>

<p>This is becoming a drag and makes it really hard to sell AuthPoint when there are flexible MFA solutions like DUO or Microsoft MFA...</p>
]]>
        </description>
    </item>
    <item>
        <title>Product Enhancement - Locked Token Notifications</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/4174/product-enhancement-locked-token-notifications</link>
        <pubDate>Wed, 05 Feb 2025 01:29:10 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>bmccorkle</dc:creator>
        <guid isPermaLink="false">4174@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>I was kinda surprised this wasn't already there but under the Cloud Administration Notifications, there's no ability to create a rule so we can be notified when an AuthPoint token is disabled due to too many invalid attempts.  It would be nice to get a heads up so I can be more proactive.</p>
]]>
        </description>
    </item>
    <item>
        <title>AuthPoint &amp; Multiple Groups Per User</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/430/authpoint-multiple-groups-per-user</link>
        <pubDate>Fri, 30 Aug 2019 13:03:58 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>jamesmcmillan</dc:creator>
        <guid isPermaLink="false">430@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Something I find very frustrating is the fact a user can only be a <a rel="nofollow" href="https://www.watchguard.com/help/docs/help-center/en-US/Content/en-US/authpoint/add_group.html" title="member of one group">member of one group</a> within AuthPoint.  This is causing administrative complexity when it comes to (for example) accessing resources such as the Access Portal (and using AuthPoint to authenticate), where there are a number of applications, and different combinations of users, using each app/set of apps:</p>

<p>App A<br />
App B<br />
App C<br />
App D<br />
App E</p>

<p>User 1<br />
User 2<br />
User 3<br />
User 4<br />
User 5<br />
User 6</p>

<p>App A - All Users<br />
App B - User 1,2,3<br />
App C - User 4,5,6<br />
App D - User 1,3,5<br />
App E - User 1,2,5,6</p>

<p>In an ideal world (one where a certain well-known competitive product is available).. I'd just sync the equivalent AD groups into AuthPoint - regardless that a number of users belong to more than one group, and assign those groups to the Access Portal as necessary.</p>

<p>From what I can make out, I'd need a separate AuthPoint group for every possible combination of access - not very scalable, and complicated.</p>

<p>If Access Policies were done at the Resource level instead of on Groups - the whole problem goes away, if I read it right?</p>

<p>Cheers, James</p>
]]>
        </description>
    </item>
    <item>
        <title>Search Capabilities in Authpoint Mobile App</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3968/search-capabilities-in-authpoint-mobile-app</link>
        <pubDate>Thu, 05 Sep 2024 15:05:37 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>FCIT</dc:creator>
        <guid isPermaLink="false">3968@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Howdy-</p>

<p>As my list of 3rd-party tokens has grown over the years, I find it difficult to find some of my tokens without a search feature. I have looked at 5 other authenticator apps and Authpoint is the only one with search capabilities. Is this something that is coming up?</p>
]]>
        </description>
    </item>
    <item>
        <title>SSLVPN + Authpoint needs to work over CGNAT</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3965/sslvpn-authpoint-needs-to-work-over-cgnat</link>
        <pubDate>Wed, 04 Sep 2024 15:59:30 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>Spencer</dc:creator>
        <guid isPermaLink="false">3965@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>My company decided to implement MFA for the VPN connections of users working remotely.   We chose Authpoint because it integrated with our existing Watchguard Firebox and SSLVPN solution.</p>

<p>Some users could not use the mobile app so we purchased some hardware tokens.  It just so happens that one of these users has T-Mobile 5G Internet which uses carrier-grade NAT.</p>

<p>When the user connects with their user name and password, they are prompted for the code from the hardware key, and they enter it.  But because of the carrier grade NAT, the second response comes from a different IP address from the first response and the authentication is rejected.</p>

<p>I had a Watchguard support case stretch out over a couple of weeks where we tried various  alternatives, and the only thing that worked was moving the user off of Authpoint and authenticating directly with the Firebox using user name and password.</p>

<p>More and more Internet providers are going to start using carrier-grade NAT to save costs and so Watchguard is going to have to deal with this.</p>
]]>
        </description>
    </item>
    <item>
        <title>Authpoint prompt for SMB Share Access</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3899/authpoint-prompt-for-smb-share-access</link>
        <pubDate>Wed, 17 Jul 2024 16:38:32 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>TenderTiger</dc:creator>
        <guid isPermaLink="false">3899@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi WG Team,</p>

<p>I have come across a situation recently that I think could drive a great addition to the Authpoint product - the ability to secure an SMB share (individually or all on an designated system) with Authpoint, thereby requiring a successful MFA approval to grant access.</p>

<p>I understand it's probably a bit of a niche feature, but we have several customers with very specific security controls and must comply with various industry standard and government certifications/controls/compliances. It would certainly be helpful to be able to lock down access to a share with MFA.</p>

<p>My organization is actively pursuing similar certifications in order to grow our client base who require these controls/certifications, so having a tool like this will go a long way in our support of our existing and future clients!</p>

<p>Thanks!</p>
]]>
        </description>
    </item>
    <item>
        <title>Support for SAML SSO with Verkada Command</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3716/support-for-saml-sso-with-verkada-command</link>
        <pubDate>Tue, 12 Mar 2024 16:12:48 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>eichenadmin</dc:creator>
        <guid isPermaLink="false">3716@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Product enhancement suggestion: It would be good if Authpoint could be used for SSO with Verkada Command.  (Verkada Command is the web facing management service for Verkada security cameras, physical door access controls, etc.)</p>
]]>
        </description>
    </item>
    <item>
        <title>Support for Kerberos</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2362/support-for-kerberos</link>
        <pubDate>Tue, 01 Feb 2022 13:59:43 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>rv@kaufmann.dk</dc:creator>
        <guid isPermaLink="false">2362@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,</p>

<p>Would like to see support for kerberos protocol.<br />
Not much use making a admin account member of <strong>Protected Users</strong> group when AuthPoint do not support Kerberos.</p>

<p>If the user account do not allow ntlm authentication authpoint gives us this:</p>

<p>Reason: The LDAP password is not valid.<br />
Error: 201.045.003 - Authentication transaction is not authorized.</p>

<p>/Robert</p>
]]>
        </description>
    </item>
    <item>
        <title>Lock screen Notifications</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1032/lock-screen-notifications</link>
        <pubDate>Tue, 09 Jun 2020 11:43:51 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>Aron</dc:creator>
        <guid isPermaLink="false">1032@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,</p>

<p>I'd love the option to stop the push notifications from being able to be approved from the lock screen as it can be a security risk.</p>

<p>I know you can manually set which apps can display content on the lock screen on each device but that isn't a possibility in large deployments.</p>

<p>If there is a technical limitation, maybe see if you can get it to at least report the status to the dashboard.</p>

<p>Thanks.</p>
]]>
        </description>
    </item>
    <item>
        <title>AuthPoint App User Experience</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3235/authpoint-app-user-experience</link>
        <pubDate>Thu, 27 Apr 2023 12:24:05 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>Chris_Kelly</dc:creator>
        <guid isPermaLink="false">3235@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,</p>

<p>I just finished deploying the AuthPoint app to ~40 users, and it's time for some constructive feedback with regards to the user experience <img src="https://community.watchguard.com/resources/emoji/smile.png" title=":)" alt=":)" height="20" /></p>

<p>The progress bars on each token have been universally misleading. Almost without exception, every single user I set up said/asked some variant of "it's trying to do something", "it's downloading/uploading something", "It's been doing this for the last 2 hours and nothing's happened", etc. I suggest they should be replaced with something more intuitive - for example the MS authenticator app uses a countdown circle where it shows the number of seconds remaining in the center, and the circumference of the circle is the progress bar that reduces, not increases as time goes on.</p>

<p>Also, the "Check for pending push notifications" link seems to confuse people as well - many people have read it as "Check<strong>ing</strong> for pending push notifications", and also assumed that its "doing" something. Perhaps removing it from the main display and putting it in the menu would be more suitable. The language also strikes me as a little off - if you have to fetch, it's not push.</p>

<p>Cheers!<br />
-Chris</p>
]]>
        </description>
    </item>
    <item>
        <title>FIDO2 support</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3777/fido2-support</link>
        <pubDate>Tue, 23 Apr 2024 05:40:33 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>KAndersson</dc:creator>
        <guid isPermaLink="false">3777@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>FIDO2 support and the ability to add your own 3rd party hardware tokens e.g Yubico tokens to work in conjunction with Authpoint logonapp.<br />
Alternative - Create your own new hardware tokens that supports more modern and user friendly 2fa options</p>
]]>
        </description>
    </item>
    <item>
        <title>API - List of currently Mobile VPN user sessions</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3752/api-list-of-currently-mobile-vpn-user-sessions</link>
        <pubDate>Thu, 04 Apr 2024 09:03:04 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>Brandy</dc:creator>
        <guid isPermaLink="false">3752@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello,</p>

<p>we have setup Mobile VPN via "SSLVPN" in our infrastructure for homeoffice.<br />
We can currently see the authenticated users in both the Watchguard Cloud (/reports/auth/authentication) and the Firebox (/dashboard/system?report=bovpn -&gt; Mobile VPN).</p>

<p>We want to expose the currently authenticated mobile VPN users to an intranet page, where coworkers can see, if a colleague is currently in the office or at home.<br />
I have tried to achieve this via Watchguard Cloud API, as well as via Firebox CLI. Both attempts were unsuccessful, as there is apparently currently no way to list SSLVPN user sessions via API or CLI.</p>

<p>My suggestion:</p>

<ul><li>Add an API endpoint to display the status of all Mobile VPN sessions</li>
<li>Add "show mvpn-ssl session" to the CLI commands</li>
</ul><p>Thanks</p>
]]>
        </description>
    </item>
    <item>
        <title>Support for PUSH and OTP within same policy with ldap</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2363/support-for-push-and-otp-within-same-policy-with-ldap</link>
        <pubDate>Tue, 01 Feb 2022 14:01:38 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>rv@kaufmann.dk</dc:creator>
        <guid isPermaLink="false">2363@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hi,</p>

<p>Would like to see support for both PUSH <em>and</em> OTP within the same AuthPoint policy when using ldap radius authentication up against a firebox with either sslvpn or GUI login.</p>

<p>/Robert</p>
]]>
        </description>
    </item>
    <item>
        <title>Accounts with active Override for AuthPoint.</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3391/accounts-with-active-override-for-authpoint</link>
        <pubDate>Fri, 28 Jul 2023 19:05:23 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>s_fonley</dc:creator>
        <guid isPermaLink="false">3391@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>It would be useful if we could see which accounts have been given an override to MFA.</p>
]]>
        </description>
    </item>
    <item>
        <title>URGENT-We accindentally deleted a cloud Authpoint account c</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/3358/urgent-we-accindentally-deleted-a-cloud-authpoint-account-c</link>
        <pubDate>Tue, 11 Jul 2023 21:44:39 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>Mikey65</dc:creator>
        <guid isPermaLink="false">3358@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Can it be restored?<br />
@ support@watchguardcom</p>
]]>
        </description>
    </item>
    <item>
        <title>Deletion protection for Subscriber accounts for Partners</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2835/deletion-protection-for-subscriber-accounts-for-partners</link>
        <pubDate>Tue, 20 Sep 2022 11:28:46 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>GDA</dc:creator>
        <guid isPermaLink="false">2835@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Would it be possible to implement some form of protection against accidental deletion of WatchGuard Cloud subscriber accounts from the Partner management portal? Tombstoning accounts after deletion to enable recovery within a specified timeframe would be ideal.</p>

<p>The impact of a deleted account is very significant for AuthPoint deployments especially if the Logon App has been deployed.</p>
]]>
        </description>
    </item>
    <item>
        <title>Authpoint and Windows Dynamic lock</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2705/authpoint-and-windows-dynamic-lock</link>
        <pubDate>Mon, 18 Jul 2022 13:33:24 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>Manuela</dc:creator>
        <guid isPermaLink="false">2705@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello everyone,<br />
windows has the dynamic lock function and it would be nice when the smartphone is connected to the pc that you dont need the MFA authentication</p>

<p>Cheers</p>
]]>
        </description>
    </item>
    <item>
        <title>Watchguard Cloud access levels (not just for AuthPoint)</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2454/watchguard-cloud-access-levels-not-just-for-authpoint</link>
        <pubDate>Thu, 03 Mar 2022 02:43:26 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>GRD</dc:creator>
        <guid isPermaLink="false">2454@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>We've set up a client with read only access to their products on WG Cloud (AuthPoint and several Fireboxes). We'd like to be able to give them the ability to work with user accounts in AuthPoint, e.g. delete disabled accounts, reissue tokens etc. but there seems to be no way of doing this without giving them access that also opens up the possibility of them really messing things up, e.g. deleting or editing external resources, gateways etc.</p>

<p>Can accounts be set up with greater granularity so that we can control what they have access to, such as AuthPoint but not Firebox, and what they can do with it?</p>
]]>
        </description>
    </item>
    <item>
        <title>https://wglogin.b2clogin.com mobile access</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2317/https-wglogin-b2clogin-com-mobile-access</link>
        <pubDate>Wed, 12 Jan 2022 21:00:24 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>rv@kaufmann.dk</dc:creator>
        <guid isPermaLink="false">2317@/watchguard-community/discussions</guid>
        <description><![CDATA[Hi<br /><br /> Are there any plans to better support response design on web Pages from mobile devices?<br /><br /> Currently when we login to <a href="https://wglogin.b2clogin.com" rel="nofollow">https://wglogin.b2clogin.com</a> from a phone the layout is far from good.<br /><br /> Regards <br /> Robert]]>
        </description>
    </item>
    <item>
        <title>Location based bypass</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2271/location-based-bypass</link>
        <pubDate>Thu, 16 Dec 2021 21:17:43 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>dugyodi</dc:creator>
        <guid isPermaLink="false">2271@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>When users are in the office, they would not be required to use Authpoint.</p>
]]>
        </description>
    </item>
    <item>
        <title>SAML ByPass and allowing of accounts to NOT have AuthPoint</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2273/saml-bypass-and-allowing-of-accounts-to-not-have-authpoint</link>
        <pubDate>Fri, 17 Dec 2021 03:03:18 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>Tristan.Colo</dc:creator>
        <guid isPermaLink="false">2273@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>There needs to be an option that allows some accounts to bypass MFA without needing to be assigned an AuthPoint license. I know this has been done for LogonApp, but it needs to be done for SAML applications too.</p>
]]>
        </description>
    </item>
    <item>
        <title>Authpoint Integration with G-Suite (idp Portal)</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/2167/authpoint-integration-with-g-suite-idp-portal</link>
        <pubDate>Sat, 06 Nov 2021 10:42:04 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>Vassilis_Nikolaou</dc:creator>
        <guid isPermaLink="false">2167@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello all,<br />
I have been trying to integrate G-Suite (SAML S-S0) with Authpoint and even though I have followed all necessary  instructions I tun into the following google message <br />
"The required response parameter RelayState was missing." <br />
On google documentation  I found this<br />
"The SAML 2.0 specification requires that Identity Providers retrieve and send back a RelayState URL parameter from Resource Providers (such as Google Workspace). Google Workspace provides this value to the Identity Provider in the SAML Request, and the exact contents can differ in every login. For authentication to complete successfully, the exact RelayState must be returned in the SAML Response. According to the SAML standard specification, your Identity Provider should not modify the RelayState during the login flow.</p>

<p>Diagnose this issue further by capturing HTTP headers during a login attempt. Extract the RelayState from the HTTP headers with both the SAML Request and Response, and make sure that the RelayState values in the Request and Response match.<br />
Most commercially-available or open-source SSO Identity Providers transmit the RelayState seamlessly by default. For optimum security and reliability, we recommend that you use one of these existing solutions and cannot offer support for your own custom SSO software."</p>

<p>any suggestions ?</p>

<p>Thank you in advance</p>

<p>Vassilis</p>
]]>
        </description>
    </item>
    <item>
        <title>Feature request: SAML-Ressources | multiple attributes that can be claimed by the SP</title>
        <link>https://community.watchguard.com/watchguard-community/discussion/1956/feature-request-saml-ressources-multiple-attributes-that-can-be-claimed-by-the-sp</link>
        <pubDate>Thu, 22 Jul 2021 14:26:10 +0000</pubDate>
        <category>AuthPoint - Product Enhancements</category>
        <dc:creator>Thomas_B1</dc:creator>
        <guid isPermaLink="false">1956@/watchguard-community/discussions</guid>
        <description><![CDATA[<p>Hello everyone,</p>

<p>Concerning SAML-Ressources, SSO and Provisioning, I suggest the feature to allow multiple attributes to be send on SAML-based authentication flows.</p>

<p>So far, it is possible to add SAML ressources and can choose between [Email, User Name, Email prefix] as the User ID to be send on redirection to the service provider (SP).<br />
Increasing the number of attributes, that can be claimed by the SP, would mean that more attributes could be send and synchronised in SPs User base. Therefore you don't need to manually do this or set up additional synchronisation of users to the SP user directory, which also could cause IT-security risks.</p>

<p>These additional attributes, I'm speaking from, are for example: phone number, department, location, and so on of an user.</p>

<p>Now, with a SAML-flow that supports multiple attributes to beclaimed by the SP, these attributes can be synchronised at the time the user logs in the SP application.</p>

<h2 data-id="how-would-this-feature-benefit-customers-or-watchguard">How would this feature benefit customers or Watchguard?</h2>

<ul><li>Customers can provision Users through SAML-flow in SP application</li>
<li>Customers do not need to setup additional user synchronisation - which could also cause IT-security risks</li>
<li>Customers could reduce costs regarding user synchronisation management - the setup is only needed to be done for Authpoint user synchronisation</li>
<li>Many other MFA-/SSO-providers offer this feature - therefore Watchguard / Authpoint could increase their competitiveness and attractiveness</li>
</ul><h2 data-id="following-requirements-would-be-necessary-to-implement-the-feature">Following Requirements would be necessary to implement the feature</h2>

<ol><li>Watchguard adds the possibility to synchronise more attributes in its own user directory.</li>
<li>Watchguard adds the possibility to send more attributes on SAML-based autentication flows.</li>
</ol><p>What do you think of this?<br />
Does any other Authpoint customer could make good use of it?</p>

<p>Kind regards,<br />
Thomas</p>
]]>
        </description>
    </item>
   </channel>
</rss>
