7.0.0 Release Notes

What's New?

Release DateProduct/VersionPlatformNotes
February 15, 2022HYPR Workforce Access Client for Windows 7.0.0Windows (10, 11)
February 15, 2022HYPR Workforce Access Client for Mac 7.0.0macOS (High Sierra, Mojave, Catalina, Big Sur, Monterey)Reboot required
February 15, 2022HYPR Mobile App for Android 7.0.0Android 8.0+
February 15, 2022HYPR Mobile App for iOS 7.0.0iOS 12.4+
February 15, 2022HYPR Server 7.0.0Server
February 15, 2022HYPR Android SDK 7.0.0Android 8.0+
February 15, 2022HYPR iOS SDK 7.0.0iOS 12.4+


Backward Compatibility

All HYPR components are fully compatible across the three previous/subsequent minor (X.X) releases


Web Login Accessibility Improvements
The HYPR web login workflow has been enhanced to meet AA accessibility standards when a user authenticates using a mobile device.

Web Registration Accessibility Improvements
The HYPR Device Manager UI been enhanced to meet AA accessibility standards for all device registration tasks.

Control Center Accessibility Improvements
The HYPR Control Center UI been enhanced to meet AA accessibility standards for all administrator tasks.

API Cleanup
A number of HYPR API endpoints have been deprecated, some obsolete paths removed, and version support modified. Please see the CHANGELOG section in the API Reference for a list of the affected endpoints.

General Improvements

  • (API) Fix the /cc/api/rpUser API call to allow admins to update a Control Center User's password
  • (Control Center) Change the default expiration period for install tokens generated in the Control Center from 30 days to 90 days
  • (Control Center) Ensure Endpoint Security Tokens are removed after they expire instead of displaying negative expiration days
  • (Control Center) Ensure the number of days remaining until expiration count is accurate for Access Tokens which are about to expire
  • (Control Center) Fix the "Jump to" pagination option on the Control Center users page
  • (Control Center) Fix the "User Placeholder could not be removed" error when deleting an existing Control Center User
  • (Mobile App - Android) Fix registration failure on OnePlus6T devices
  • (Mobile App - Android) Prevent devices with a short timeout from going to screen saver in the middle of a registration or authentication
  • (Mobile App - iOS) Include a "message" value in all Audit Trail events
  • (Mobile App - iOS) Keep QR Code authentications from resetting the Web Account display name entered by the user
  • (Mobile App - iOS) Make sure the HYPR widget correctly displays the default computer name
  • (Mobile App - iOS) Make sure unlock via the HYPR widget works correctly after the user has remotely locked the workstation
  • (Mobile App - iOS) Prevent QR Login failure when logging into third-party apps using iOS 12 or 13
  • (Mobile App - iOS) Prevent crash when tapping on paired computer
  • (Platform) Improve the new streamlined web login flow to prevent phantom Okta push notifications
  • (Platform) Make sure the HYPR logo displays correctly on the Web Login page
  • (Server) Handle additional statuses sent from Windows and macOS workstations
  • (Server) Record user agent information and IP addresses for FIDO2 authentications
  • (Workforce Access Client - Windows) Ensure the HYPR service restarts correctly after sleep
  • (Workforce Access Client - Windows) Ensure the HYPR service starts correctly after an upgrade when configured as persistent VDI
  • (Workforce Access Client - Windows) Expand default logging to include CP, KSP, and SSPAP information
  • (Workforce Access Client - Windows) Fix automatic upgrade "Access is denied" exception
  • (Workforce Access Client - Windows) Fix mobile certificate re-enrollment issue
  • (Workforce Access Client - Windows) Include milliseconds in the KSP log timestamps
  • (Workforce Access Client - macOS) Add the application version to Audit Trail events
  • (Workforce Access Client - macOS) Correctly delete the /Library/HYPR folder when a user uninstalls the application
  • (Workforce Access Client - macOS) Ensure logs are correctly submitted when user has multiple accounts on the same machine
  • (Workforce Access Client - macOS) Make sure the password box allows retries when the user enters an incorrect password during a "Click to unlock with Touch ID" authentication flow
  • (Workforce Access Client - macOS) Prevent policy banners added by the user from displaying randomly
  • (Workforce Access Client - macOS) Support the retrieval of certificates from non-domain joined workstations