-
Notifications
You must be signed in to change notification settings - Fork 811
Release notes september 3 2025 #7368
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weβll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 25 commits
bd4933b
8c09f7f
48fd3bb
c217a72
c2e355b
eda84ff
22a8324
966e132
9a5deee
b5071f9
7f19ef9
7772e05
ed48c62
88cb145
79525e1
499a669
49a8955
1a765dc
25dea2f
e830410
b28426d
3eacad5
66277bb
4f92bf6
296b1b1
56e6fda
10a384b
510058e
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,50 @@ | ||
| # September 3, 2025 | ||
|
|
||
| ## Key Takeaways | ||
|
|
||
| * **Hostname Pre-Validation** β Add and validate hostnames before switching DNS, enabling zero-downtime migrations and support for on-premise proxies. | ||
| * **Managed Challenges** β Protect projects from malicious traffic surges with automated verification based on request geography or attack likelihood. | ||
| * **Custom Identity Provider (Public Beta)** β Use your existing identity provider for Cloud Portal access, permissions, and user management. | ||
|
|
||
| ## Hostname Pre-Validation | ||
|
|
||
| ### Move your site to Umbraco Cloud with zero downtime. Hostname Pre-Validation makes hostname migrations smooth and risk-free | ||
|
|
||
| Pre-validating hostnames allows you to prepare domains before pointing DNS to Umbraco Cloud. This ensures TLS certificates are issued and routing is active ahead of time, so projects can go live instantly once DNS is updated. | ||
|
|
||
| * **Zero-downtime hostname migration** β Move production domains to Umbraco Cloud without service interruptions. | ||
| * **On-premise proxy support** β Keep using your existing proxy or Web Application Firewall (WAF) setup while preparing hostnames in Umbraco Cloud. | ||
|
|
||
| <figure><img src="../../go-live/manage-hostnames/images/pre-validation-status-modal.png" alt="A screenshot of the Pre-Validation status modal"></figure> | ||
|
|
||
| This means safer go-lives and improved domain management. See the [Hostname Pre-Validation documentation](../../go-live/manage-hostnames/hostname-pre-validation.md) for a full overview of how to use the feature. | ||
|
|
||
| ## Managed Challenges | ||
|
|
||
| ### Managed Challenges keep bots out and let your real users in. | ||
|
Check warning on line 24 in umbraco-cloud/release-notes/overview-2025/2025-09-03-releasenotes.md
|
||
eshanrnh marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| When websites face unusual load, whether from bots, scraping, or coordinated attacks, Managed Challenges step in. Requests that do not meet the threshold are automatically served a lightweight CAPTCHA that helps filter out bad traffic. | ||
|
|
||
| * Can be applied globally, per hostname, or even per continent. | ||
| * Works seamlessly alongside the built-in WAF. | ||
|
|
||
| WAF sensitivity and Manage Challenge features can be applied in Security Settings: | ||
hemraker marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| <figure><img src="../images/security-settings.png" alt="A screenshot of the Security Settings with the new features for Managed Challenges"></figure> | ||
|
|
||
| You get added resilience without manual intervention and tools to ensure resources are spent serving customers, not malicious requests. Read more about the new features in the updated [Managing Transport Security documentation](../../build-and-customize-your-solution/set-up-your-project/security/managing-transport-security.md) | ||
|
|
||
| ## Custom Identity Provider (Public Beta) | ||
|
|
||
| ### Use your own identity provider to manage Cloud Portal access. | ||
|
Check warning on line 38 in umbraco-cloud/release-notes/overview-2025/2025-09-03-releasenotes.md
|
||
eshanrnh marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| You can now connect identity providers, like Microsoft Entra ID, Octa, or Google, directly to your Umbraco Cloud organization. This lets team members sign in with familiar credentials and manage project permissions through their existing setup. | ||
|
|
||
| * Centralized authentication with OpenID Connect. | ||
| * Map roles and project access directly from your provider. | ||
| * Keep audit logs of external login usage. | ||
|
|
||
| <figure><img src="../../.gitbook/assets/organization-external-login-provider.png" alt=""><figcaption></figcaption></figure> | ||
|
|
||
| Enterprises and organizations can rely on centralized account management with industry-standard security. This means less time spent managing accounts and permissions, whether you're onboarding or offboarding. | ||
|
|
||
| Custom Identity Providers for Cloud organizations is currently in Public Beta, and we aim for full release early October. If you have any feedback or encounter issues with the feature, reach out to us on [[email protected]](mailto:[email protected]). For a full overview of the features and how to use them, see the [Organization Login Providers documentation](../../begin-your-cloud-journey/the-cloud-portal/organizations/organization-login-providers.md). | ||
|
Check warning on line 50 in umbraco-cloud/release-notes/overview-2025/2025-09-03-releasenotes.md
|
||
Uh oh!
There was an error while loading. Please reload this page.