7.9.0.1 Your Typical Dot-One Release

Hello Everyone! For those who have upgraded to 7.9 we hope you’re enjoying it and we thank you for your early adoption feedback. As typical we have our first patch already based on your reports. The most important fix is a permissions issue that has affected a few of you, and we encourage everyone to upgrade because of it. It manifested as seeing or not seeing various portions of the Web UI inappropriate to the Role held by the Account. Other bug fixes as always are in our Release Notes.
But just because this is a quick bug release doesn’t mean there’s nothing new! Nothing huge mind you, but a couple quick items of note:
- Password reset link on the Web login page (only displayed after a failure, only works if you’ve set up email)
- Recognition for Windows 10 22H2
- Support for Multi-step Webhooks, and improvements to loop detection in Actions
- Computer History event added for when a client connects the first time (handy for knowing when a pre-stage record was joined by KeyAccess)
- Support for Google Tag Manager and other similar analytics products
And that’s it! Quick and easy, tightening up our “history making” major release.
See you next patch 🙂
Author: Yadin Flammer
Site Search
Documentation Search
Categories

Social
Subscribe
| Thank you for Signing Up |


Alastair Downie IT Manager, Gurdon Institute, University of CambridgeWe have a 300-client license and it’s one of the most important services we provide for our Researchers. Scientific software is often prohibitively expensive for individuals to buy, particularly in today’s economic environment, and K2 offers us a very elegant solution. I think it’s a great package – easy to install and manage, rock solid and reliable – it hasn’t crashed once in the 7 years we’ve been running it.
Libby Lester Martin/Williams AdvertisingWe use K2/KeyServer to block the use of peer-to-peer, file sharing software. Our management is happy to know that K2 protects our company both from the legal exposure of unauthorized copyrighted works, and from the security risk of questionable software.













