Privileged Remote Access 26.1.1 release notes
š Security update
Important - for On-Premises customers:26.1 - Critical Update Controls: Improved Clarity & Safeguards
In 26.1, weāve strengthened how critical security updates are communicated and managed, without changing existing selected options.
- If you have previously disabled critical security updates WE STRONGLY recommend you re-enabled them to better protect your appliance's security posture.
- To re-enable critical security updates:
- Sign in to your B Series Appliance
- From the top menu, click Updates
- Check Automatically install critical updates every day during the Maintenance Window
- Click Save
- If you chose to disable critical security updates, you will now see ināproduct messaging highlights the security risks of opting out and informs customers of upcoming changes to critical update handling that will no longer allow you to disable them for critical updates that don't cause downtime starting in the next release of the product.
26.2 - Critical Security Updates Automatically ReāEnabled
Starting in 26.2, critical security updates will be reāenabled by default to help ensure appliances remain protected against actively exploitable vulnerabilities.
- Customers who previously opted out of critical updates will be opted back in.
- Optāout options may remain available, but with additional safeguards and warnings.
- Customers who fully opt out of critical updates assume responsibility for associated security risks.
š New features
Hear endpoint audio during remote sessions
Representatives can now hear audio from supported endpoints during remote sessions. This helps troubleshoot devices that communicate status through sounds (such as alerts, beeps, or spoken prompts) without needing someone physically present.

Allow or Deny System Sound Sharing
- Sounds are not currently recorded in Session Recordings, but will be in a future release.
- For more information, see User Settings , Active access sessions, and Web sessions.
New and improved macOS Jump Client deployment
The macOS Jump Client is now deployed using a .pkg installer.
- Version 25.3.1+PRA or later is required before upgrading to 26.1.1 Privileged Remote Access.
- Only system mode Jump Clients are supported. User mode Jump Clients are no longer supported on macOS.
- If Mac User Mode Jump Clients are detected during an upgrade to 26.1.1, a Pre-upgrade 10 warning is displayed to prevent potential Jump Client loss.
Installations can be customized using a configuration profile (.mobileconfig) deployed prior to installing the .pkg file. Two installer types are available:
-
Generic installer: Requires a .mobileconfig file that includes, at minimum, key_info. Additional settings such as comments and Jump Group can also be specified in the same file.

Located on the Asset Management > Jump Clients tab
-
Non-generic installer: Does not require a .mobileconfig file, as connection information is built into the installer. A .mobileconfig file is only needed if you want to customize settings such as comments or Jump Group.
The steps to install a configuration profile (.mobileconfig) vary depending on your macOS version.
Newer macOS versions
Use one of the following methods:
- Finder: Double-click the .mobileconfig file to open it, then navigate to System Settings > Privacy & Security > Device Management and install the profile.
- Device Management: Open System Settings > Privacy & Security > Device Management and add the profile directly from the list.
Older macOS versions
Double-click the .mobileconfig file. The profile installs automatically.
MDM deployment
If you are deploying the configuration profile programmatically via Mobile Device Management (MDM), refer to your MDM tool's documentation for the appropriate installation steps.
For more information, see Jump Clients: Install on macOS.
Navigate the UI with clearer Asset terminology
The user interface now uses more descriptive, context-aware terms in place of many Jump labels. This makes navigation and configuration easier to understand for new users while retaining key terms like Jump Client for continuity.

Asset Management page, formerly known as Jump.
For more information, see the updated terms at the top of the Privileged Remote Access glossary.
Proxy brokered RDP sessions
Jump Clients now support Remote Desktop Services (RDS) environments where incoming Remote Desktop sessions are brokered to a Collection of Remote Desktop Session Hosts. Previously, the Jump Client attempted to connect directly to the broker, which did not account for Collection-based routing. Sessions are now correctly routed to the configured Session Host Collection rather than the broker.
For more information, see Create an RDP shortcut.
Automatic SSH Erase Key Configuration for Shell Jump Sessions
Shell Jump sessions now automatically configure the SSH erase key character from the remote system, improving compatibility with other systems that prefer non-default erase characters.
Atlas support for FedRAMP (Cloud only)
Atlas deployments are now supported in FedRAMP environments, with availability in the US-East (US-E) region.
Balance sessions across clustered Gateways
Sessions initiated through a clustered Gateway are now routed to a node selected based on factors such as latency or current load. This improves connection responsiveness while preserving the redundancy benefits of a clustered deployment.
For more information, see Understand clustered Gateways.
Use FIDO2 security keys as a second factor in Cloud and On-premises only deployments
Cloud and on-premises only deployments can now use FIDO2 authenticators as a second factor for authentication. This provides a phishing-resistant MFA option and enables FIDO2 to be used for per-session MFA requirements where supported by policy.

Navigate to My Account > Security to register your FIDO2 authenticator
For more information, see Cloud Account Security.
Require explicit approval before apps can use network tunnels
The Network Tunnel feature now requires explicit approval for processes that attempt to use the virtual NIC. This change prevents unauthorized or malicious applications from silently routing traffic through the secure tunnel, ensuring that only trusted processes can use the tunnel for connectivity.

Enable Protocol Tunnel Usage Consent option
For more information, see Enable Protocol Tunnel method and Enabling IP Tunnel Usage Consent for Network Tunnels.
Delegate administration with granular permissions
Administrative tasks can now be delegated with more granular permissions instead of requiring global administrator access. When you use the Allowed to Set Passwords and Reset MFA setting this enables scoped user-management actions (including MFA reset).

Located under Users & Security > Users
For more information, see Group Policy settings .
AI-Augmented Query Assistant for PRA
Pathfinder PRA sites now have access to an MCP server that can be added to AI assistants to interact with PRAās Configuration API.
Import endpoint lists to target Endpoint Automation jobs
Endpoint Automation jobs can now target systems by importing or pasting a list of endpoint names (Jump Clients). Jobs run only against endpoints the user is authorized to access, and lists can be maintained for repeatable operations.
For more information, see Endpoint automation.
Consume Command API responses in JSON
The Command API now supports JSON output in addition to XML. This makes it easier to integrate command results with modern automation and integration tooling that expects JSON payloads.
For more information, see Command API - JSON.
Log out of your SAML identity provider when you sign out of Privileged Remote Access
SAML-authenticated users can now be logged out of their Identity Provider when they sign out of the product (where the IdP supports SLO). This helps ensure sessions end consistently across both systems and reduces the risk of lingering authenticated sessions on shared devices.

Navigate to Users & Security > Security Providers > Identity Provider Settings
For more information, see Add a security provider - SAML2.
MongoDB proxy protocol tunnels now supported in PRA
Privileged Remote Access now supports a protocol proxy for MongoDB, allowing customers to route MongoDB traffic through PRA. Queries sent through this proxy can be logged and audited, and protocol tunnels can be established with credential injection so local MongoDB clients can securely connect to remote databases.
For more information, see Set up a database connection.
New Session Expiration Monitoring and User Alert API
The new Session Expiration Monitoring and User Alert API enables client applications to monitor the remaining time of an active Privileged Remote Access session and alert users before the session expires. The API exposes session expiration data and near-expiration events, allowing integrated systems such as Entitlement Service or User Console to provide timely warnings and reduce unexpected session termination caused by entitlement duration limits, policy-based timeouts, or administrative actions.
For more information, see Session Expiration Monitoring and User Alert API.
Confirm risk and verify connectivity when managing critical auto-updates
When disabling automatic critical updates, administrators must now acknowledge a high-signal warning and type a confirmation value before the setting is applied. The updates page also surfaces update-service connectivity status and supports on-demand connectivity testing, helping prevent situations where automatic updates appear enabled but cannot function.
For more information, see Updates.
Access archived data without enabling legacy XML and Archive API settings
The legacy Enable XML API and Enable Archive API settings are no longer required to access historical archived event data. These capabilities are now available by default, helping dashboards and integrations continue to retrieve archived history after restarts or service interruptions.
For more information, see API configuration.
RedHat OpenShift support
We now support RedHat OpenShift KVM virtual machines.
For more information, see RedHat documentation.
Important informationThe minimum recommended instance size is 4 CPUs and 32 GB memory.
⨠Enhancements
UI/UX Improvements
- Updated the text for the default credential checkbox to Remember as my default for this item.
- Updated the title of the Access Approval window to be āAccess Approvedā or āAccess deniedā to reduce confusion during user authorization.
- When a user attempts to start sessions with more than 10 Assets selected simultaneously, a clearer message is now displayed explaining the limitation.
- After submitting an access request in the web console, a confirmation message is now immediately displayed and the screen refreshes to reflect the updated request status.
Customize console columns and share saved filters
The desktop console now lets users choose which columns appear in the list view, including custom fields and additional asset attributes. Users can filter and search based on these columns, and saved filters can be reused or shared to improve team workflows.
For more information, see Access console interface.
Server-Side Screen Scaling
Screen sharing now scales captured images on the server before transmitting them to the viewer, reducing network bandwidth usage.
Added "Fit to console window" option for RDP Display Size
Added a Fit to console window option to the Default RDP Display Size setting. When selected, the remote desktop is automatically sized to fill the available viewer area in the console window, eliminating scrollbars and letterboxing.
Increased Jump Client Upgrade Bandwidth
The maximum bandwidth for Jump Client upgrades has been increased from 100 mebibyte (MiB) to 1 gibibyte (GiB).
For more information, see Jump Client - upgrade.
š ļøIssues Resolved
Administrative Interface
| Product area | Description | Resolution |
|---|---|---|
| Vault | Shared SSH Vault credentials could not be used simultaneously by multiple sessions. | Shared SSH Vault credentials can now be used concurrently across multiple sessions. |
| Vault | A user unauthorized to use a Gateway was blocked from importing Assets into Vault. | Gateway authorization no longer affects a user's ability to import Assets into Vault. |
| Vault | Bulk Vault Account Provisioning experienced performance degradation in large deployments. | Performance improvements have been made to bulk Vault Account Provisioning to better support large deployments. |
| Security Providers | RADIUS authentication was available as a supported authentication method. | RADIUS authentication is now deprecated and will be removed in a future release. Migrate to a supported authentication method. |
| Misc | Peer to Peer Options labeling was unclear. | Peer to Peer Options have been updated to use clear Enabled or Disabled labels. |
| Misc | The Enable XML API and Enable Archive API options in /Login ā Management ā API Configuration required manual activation. | These options have been removed. Both XML API and Archive API are now always enabled by default. |
Clients
| Product area | Description | Resolution |
|---|---|---|
| Access Console | Filtering performance for Asset lists in the Access Console was slow. | Filtering performance for Asset lists has been improved. |
| Access Console | The Access Console crashed when attempting to start a PostgreSQL Asset session. | The Access Console no longer crashes when starting a PostgreSQL Asset session. |
| Access Console | Tool tip verbiage for various File Transfer buttons was outdated. | Tool tip text for File Transfer buttons has been updated for clarity. |
| Access Console | The Access Console restored to the incorrect monitor after being minimized. | The Access Console now restores to the correct monitor after minimizing. |
| Access Console | Access Console login failures occurred intermittently. | Access Console login failures have been resolved. |
| Access Console | Exporting Assets to a CSV file produced blank lines between each item. | CSV exports no longer contain blank lines between items. |
| Access Console | The Virtual Smart Card button became disabled after stopping and restarting screen sharing. | The Virtual Smart Card button remains enabled after stopping and restarting a screen sharing session. |
| Access Console | Asset search executed unexpectedly using partially entered text before the user pressed Enter. | Asset search now only executes when the user presses Enter. |
| Access Console | Color quality options (such as More Colors and Full Color) were not visible in the Access Console when the /login Default Quality setting was set to Forced on a freshly installed Access Console. | Color quality options are now correctly displayed in the Access Console when the Default Quality setting is set to Forced. |
| Web Access Console | The desktop background on Windows 11 endpoints sometimes turned black after rebooting during an active screen sharing session. | The desktop background on Windows 11 endpoints no longer turns black after a reboot during screen sharing. |
| Virtual Smart Card | Smart Card credential providers disappeared after disconnecting and reconnecting to a Remote RDP session. | Smart Card credential providers are now retained after disconnecting and reconnecting to a Remote RDP session. |
| Jump Client | Jump Clients did not detect system proxy settings unless a user with proxies configured was currently logged in. | Jump Clients now detect system proxy settings regardless of whether a configured user is logged in. |
| Jump Client | In Atlas deployments, Jump Clients went offline during upgrades. | Jump Clients in Atlas deployments remain online during upgrades. |
| Gateway | Docker Gateways crashed when a manual proxy was configured. | Docker Gateways no longer crash when a manual proxy is used. |
| Shell | Copy/paste operations in Shell sessions experienced a noticeable delay. | Copy/paste delay in Shell sessions has been resolved. |
| Mac | Mac User Mode Jump Clients are no longer supported as of 26.1.1. | Mac User Mode Jump Clients detected during an upgrade to 26.1.1 trigger a Pre-upgrade 10 warning to prevent potential Jump Client loss. |
| Mobile Devices | Default overlays for iOS devices displayed the device "notch" unintentionally. | Default overlays for iOS devices have been updated to prevent the notch from appearing. |
š Requirements
- Requires Base 8.2.0
- Supports ECM Protocol 1.6
- Supports upgrades from 25.3.1 Privileged Remote Access+.
- Validated with ECM 1.6.2601.35016
- Validated with Integration Client 25.1.1
- Includes VSC 1.2.10.2
Before upgrading, ensure any SSL certificates used are either from a trusted Certificate Authority, or, for self-signed certificates, the certificate is either trusted on all endpoints or explicitly included in their installation.
ā°Deprecation Notice
Privileged Remote Access 26.1.1 is the final release to support RADIUS-based authentication. Starting in PRA 26.2.1, RADIUS-based authentication will be removed and will no longer be supported. This change reflects the fact that RADIUS no longer aligns with modern security requirements and cannot be sufficiently hardened against current threat patterns. Customers using RADIUS authentication should migrate to a supported authentication method before upgrading to PRA 26.2.1.