On This Page
Note: Okta has changed our release model and version numbering. For more information, see: https://support.okta.com/help/s/article/New-Okta-Release-Model
|Change||Expected in Preview Orgs|
|Password Import Supports SHA-1 and MD5||March 6, 2019|
|Enable Role Assignment to Every Member of a Group||March 6, 2019|
|New Rate Limits for /users/me||March 6, 2019|
|Generic OIDC IdP is now GA in Preview||March 6, 2019|
|User Search is now GA in Production||March 6, 2019|
|The Import Inline Hook is in EA||March 6, 2019|
|Previously Released Early Access Features 2019.03.0 Update||Available Now|
The Create/Update User API now supports importing users with SHA-1 and MD5 credentials. For more information, see our Users page.
Super and Org Admins can now assign and unassign roles to every user in a group using the APIs. For more information, see our Roles page.
The rate limits for the
/users/me endpoint have been updated. For more information, see our Rate Limits page.
Generic OpenID Connect allows users to sign in to an Okta org using their credentials from their existing account at an OIDC Identity Provider. A generic OIDC IdP can be a third-party IdP that supports OIDC, such as Salesforce or Yahoo or your own custom IdP. You can also configure federation between Okta orgs using OIDC as a replacement for SAML. For more information, see Federate Okta with OpenID Connect.
Extended search capabilities for the
/users endpoint is now Generally Available. For more information, see our Users page.
The Import Inline Hook enables you to add custom logic to the process of importing new users into Okta from an app.
The following features have already been released as Early Access. To enable them, contact Support.
|Early Access Features Available Now|
|Custom URL Domains|
|Custom Okta-hosted Sign-In Page|
|Custom Error Page|
|User Consent for OAuth 2.0 and OpenID Connect Flows|