5 October 2023 (v2.101)

ReachFive v2.101 introduces our Premium Analytics, updates the Identity Fraud Protection module, makes some important updates to our WeChat Connector, and brings some other improvements as well. As always, we fixed a few issues.

Release highlight

Premium Analytics

ReachFive’s Premium Analytics offers deeper insight into your user base’s behaviour beyond that of just the standard analytics package as shown in Analytics. Combined with the powerful out-of-the-box analytics that come standard with ReachFive, these Premium Analytics help you to better understand how your users are interacting with your sites so you can best tailor experiences for them and respond to new patterns as they emerge.

For a complete look, check out Premium Analytics .

To get started with Premium Analytics, go to Analytics  Premium Analytics in your ReachFive Console.

premium analytics home dashboard

Identity Fraud Protection

We have made some updates to our Identity Fraud Protection (IFP) module whereby you’re now able to protect requests from the backend, ensuring all customers are able to leverage the powerful IFP functionality. This is done via a new secure header called True-Client-IP that contains the user’s IP.

You can find this on your ReachFive Console at Settings  Attack protection policy.

For more, see Identity Fraud Protection.

width-450px



WeChat Connector updates

WeChat is now fully available in our Android SDK. Users are redirected to their WeChat app on Android, allowing you to leverage the full potential of our connector on Android devices.

To ensure optimal functionality with our WeChat Connector, we updated the ReachFive Console so that you can configure your mobile app Client ID and Client Secrets separately.

For more, see WeChat Connect.
For more on Android integration, see our Android SDK docs.



Other improvements

  • We have ensured that expired trusted devices are properly removed from the database.

    For more, see Risk-based Authentication.



Fixes

Item Fixed

We fixed an X-Frame-Options security vulnerability.

There was a minor issue exporting user events for some customers.