Web Agents

New in Web Agent 2025.x

Web Agent 2025.11

Web Agent 2025.11 is a minor release that introduces new features, functional enhancements, and fixes.

JWT signature validation

When the agent is configured to validate the JWT signature locally, it now returns a 403 response if validation fails. Previously, the agent would clear the cookie and redirect the user to the login page.

One-level wildcard Not-Enforced rules

Trailing forward slashes (/) are now ignored when evaluating Not-Enforced rules with one level wildcards (-*-). This change ensures that requests to resources with a trailing forward slash are correctly matched by Not-Enforced rules that use one-level wildcards.

Apache ErrorDocument authorization support

A new AmAuthErrorDocument Apache directive lets you switch authorization on or off for ErrorDocument internal file or CGI redirects.

Switch this on when you have ErrorDocuments that use CGI scripts and require authorization.

Policy decision monitoring metrics

We’ve made changes to the policy decision cache metrics to make it clearer which cache is being used.

The existing cache_decision_total metric is now updated when the AM_POLICY_CACHE_MODE environment variable is set to on and a new url_cache_decision_total metric is updated when this environment variable is set to off.

Learn more in policy decision metrics.

Web Agent 2025.9

Web Agent 2025.9 is a minor release that introduces new features, functional enhancements, and fixes.

Apache mod_headers

We’ve made changes to the Apache Web Agent to make it compatible with mod_headers. This allows you to set security headers, including CORS responses, in the Apache configuration using mod_headers.

Learn more in Apache Module mod_headers in the Apache documentation.

These changes have been removed in Web Agent 2025.11 because they can cause authentication flows to fail.

Web Agent 2025.6

Web Agent 2025.6 is a minor release that introduces new features, functional enhancements, and fixes.

FIPS 140 support

We’ve made changes to Web Agent to provide FIPS 140 compliance.

  • Unix-based agents support the OpenSSL 3.1.2 FIPS module, which is a FIPS 140-3 compliant security provider.

  • Windows-based agents support the use of FIPS compliant algorithms to make them FIPS 140-2 compliant.

Learn more in FIPS 140 compliance.

Public client certificate friendly name

A new Public Client Certificate Friendly Name property lets you set the friendly name used to look up the client certificate in the Windows certificate store for agents using Schannel.

Use this new property instead of the Public Client Certificate File Name property to set the certificate friendly name.

The Public Client Certificate File Name property should now be used only for the name of the file that contains the client certificate chain.

TLSv1.3 security protocol

The TLS 1.3 security protocol can now be disabled for Windows Secure Channel API (Schannel) if required by adding -TLSv1.3 to the Security Protocol List.

Policy decision monitoring metric

We’ve added a new authenticated_return_total metric to the policy decision metrics returned by the Prometheus endpoint. This metric provides a count of the requests returned after authentication.

It’s useful to monitor this metric with the not_authenticated_total metric as a possible indicator of a Denial of Service (DoS) attack.

Web Agent 2025.3.x

Web Agent 2025.3.1

Web Agent 2025.3.1 is a maintenance release. It contains no new features.

Web Agent 2025.3

Web Agent 2025.3 is a major release that introduces new features, functional enhancements, and fixes.

Content Security Policy header - frame-ancestors

We’ve made changes to the Web Agent to provide support for the Content Security Policy (CSP) frame-ancestors directive, which lets you specify which parent sources can embed a page in an iframe (and other HTML elements).

The agent sets this directive on direct responses, such as authentication and PDP, so this only affects pages related to these responses.

By default, the Web Agent sets this directive to self, which only allows the site hosting the agent to embed pages in iframes.

The following new bootstrap properties are available:

  • The Frame Ancestors None property controls whether pages can be embedded in iframes or not.

  • The Frame Ancestors Sources property controls which parent sources can embed pages in a <frame>, <iframe>, <embed> or <object> element if embedding is allowed.

Learn more in iframes.

Agent authentication to Advanced Identity Cloud and AM

We’ve made changes to how Web Agent authenticates to Advanced Identity Cloud and AM.

The default fallback mode setting (0) for the AM_AGENT_AUTH_MODE installation environment variable and the Agent Authentication Mode property has been removed. The default setting is now 1 meaning the agent always authenticates using the Agent journey.

If the Agent journey doesn’t exist, you should create it. Learn more in Authenticate agents to the identity provider.