On this page
Okta Identity Engine API release notes (2023)
December
Weekly release 2023.12.2
Change | Expected in Preview Orgs |
---|---|
Bugs fixed in 2023.12.2 | January 4, 2024 |
Bugs fixed in 2023.12.2
When the Single Logout (SLO) feature was enabled for an org, an extra
?
character was appended to sign-out redirect URIs (post_logout_redirect_uri
). (OKTA-668618)A
next
link header was returned when a list clients (GET /oauth2/v1/clients
) request was made when there were no further clients to be fetched. (OKTA-658169)When using Okta Expression Language in Identity Engine, the
EXACT
andSTARTS_WITH
operators couldn't be used with thegroup.profile.name
key to return exact matches. (OKTA-636560)Some free-trial orgs could send customized email templates. (OKTA-673562)
Weekly release 2023.12.1
Change | Expected in Preview Orgs |
---|---|
DPoP support for Okta management APIs is EA in Preview | December 13, 2023 |
DPoP support for Okta management APIs is EA in Preview
You can now use OAuth 2.0 Demonstrating Proof-of-Possession (DPoP) access tokens to access Okta management APIs. See Configure OAuth 2.0 Demonstrating Proof-of-Possession.
Monthly release 2023.12.0
Change | Expected in Preview Orgs |
---|---|
Devices API: new expand query parameter option | December 6, 2023 |
Org detail retrieval and user app listing for MyAccount API is GA in Production | November 8, 2023 |
MyAccount Authenticators API is GA in Preview | December 6, 2023 |
Demonstrating Proof-of-Possession is GA in Production | March 15, 2023 |
New possession constraint property available for Policy API | December 6, 2023 |
Bugs fixed in 2023.12.0 | December 6, 2023 |
Devices API: new expand query parameter option
The Devices API now includes a userSummary
option for the expand
query parameter in the List all Devices (opens new window) endpoint (GET /api/v1/devices
). This new option returns a summary list of associated users for the device in the _embedded
property. Previously, only the user
option was available, which returned a full-detailed list of associated users. This new option allows API users to receive a smaller subset of key information for each user, thus improving performance without compromising functionality.
Org detail retrieval and user app listing for MyAccount API is GA in Production
Two new endpoints for the MyAccount API (/idp/myaccount/organization
and /idp/myaccount/okta-applications
) allow customers to retrieve org details and get a full list of the current user's Okta apps. See MyAccount API (opens new window).
MyAccount Authenticators API is GA in Preview
With the new MyAccount Authenticators API (/idp/myaccount/authenticators/
), you can list enrolled and un-enrolled authenticator information. You can also access details of specific authenticators and enrollments.
Demonstrating Proof-of-Possession is GA in Production
OAuth 2.0 Demonstrating Proof-of-Possession (DPoP) is a security feature that adds an extra layer of protection to OAuth 2.0 access tokens. It enables the client to demonstrate that it possesses a particular key or secret associated with the access token. OAuth 2.0 DPoP can help prevent certain attacks, such as token theft or token replay attacks, where an attacker intercepts a legitimate access token and uses it to gain unauthorized access to a protected resource. See Configure OAuth 2.0 Demonstrating Proof-of-Possession.
New possession constraint property available for Policy API
A new userVerification
property is available for the constraints
object of the Policy API (opens new window). This setting can ensure the verification of a possession factor through a PIN or biometrics.
Bugs fixed in 2023.12.0
DELETE requests to the
/idp/myaccount/emails
endpoint didn't delete verified secondary emails. (OKTA-637160)PUT calls to
/policy/{id}
after migration to Okta Identity Engine returned a 400 Bad Request error message that wasn't clear. (OKTA-665573)SSO failed when authorization-method references (AMRs) weren't included in SAML assertions. (OKTA-655746)
DPoP proofs signed using an Elliptic Curve key couldn't be used. (OKTA-669345)
Okta wasn't validating that DPoP JWTs were minted right before the DPoP proof was used. (OKTA-671124)
Password requests with an empty
salt
parameter value caused asaltOrder
validation error. (OKTA-643212)
November
Weekly release 2023.11.1
Change | Expected in Preview Orgs |
---|---|
Bug fixed in 2023.11.1 | November 29, 2023 |
Bug fixed in 2023.11.1
A GET call to /api/v1/sessions/me
returned a 403 Deny response. This occurred with an active session, when the Global Session Policy included a rule allowing IdP sign-in flows, and when the default rule rejected non-IdP sign-in flows. (OKTA-626522)
Monthly release 2023.11.0
Change | Expected in Preview Orgs |
---|---|
SMS and voice support for OOB and MFA OOB grant flows is EA in Preview | November 8, 2023 |
Org detail retrieval and user app listing for My Account API is GA in Preview | November 8, 2023 |
CORS restrictions removed for revoke endpoints | November 8, 2023 |
Developer documentation update in 2023.11.0 | November 8, 2023 |
Bugs fixed in 2023.11.0 | November 8, 2023 |
SMS and Voice support for OOB and MFA OOB grant flows is EA in Preview
Direct authentication out-of-band (OOB) and multifactor out-of-band (MFA OOB) grant flows now support the phone authenticator with SMS and voice factors. See Phone (MFA) and Phone (primary factor).
Org detail retrieval and user app listing for My Account API is GA in Preview
Two new endpoints for the My Account API (/idp/myaccount/organization
and /idp/myaccount/okta-applications
) allow customers to retrieve org details and get a full list of the current user's Okta apps for a particular end user. See My Account API (opens new window).
CORS restrictions removed for revoke endpoints
Cross-origin resource sharing restrictions have been removed for the OAuth 2.0 /revoke
endpoints (/oauth2/v1/revoke
and /oauth2/{authorizationServerId}/v1/revoke
).
Developer documentation update in 2023.11.0
The direct authentication grant types are now in a new Configure Direct Authentication grant types guide rather than the Implement authorization by grant type guide. The new guide presents the grant type flows by authenticator rather than grant type, and then further differentiates the flows by either primary factor or secondary (MFA) factor. The grant types are found on the following pages:
- OTP grant type -> OTP (primary factor): When you want to use an OTP factor, such as Google TOTP or Okta Verify, as a primary factor
- MFA OTP grant type -> OTP (MFA): When you want to use an OTP factor as a secondary factor (MFA)
- OOB grant type -> Okta Verify Push (primary factor) and Phone (primary factor): When you want to use an out-of-band factor as a primary factor
- MFA OOB grant type -> Okta Verify Push (MFA) and Phone (MFA): When you want to use an out-of-band factor as a secondary factor (MFA)
Bugs fixed in 2023.11.0
When attempts were made to update the profiles of app users whose profiles were controlled by external apps, an incorrect error was returned. (OKTA-640752)
Some operations for the Factors API (
GET /api/v1/users/{userId}/factors/{factorId}
andGET /api/v1/users/me/factors/{factorId}
) weren't accessible when using tokens created by read-only admins. (OKTA-648751)When many apps were added to routing rules through the API, system performance was degraded. (OKTA-653756)
When a partial set of AMRs was passed in an IdP-initiated flow, Okta redirected the user to the IdP instead of challenging for remaining factors. (OKTA-657359)
October
Weekly release 2023.10.2
Change | Expected in Preview Orgs |
---|---|
Bugs fixed in 2023.10.2 | November 1, 2023 |
Bugs fixed in 2023.10.2
AMR claims weren't accepted when the inbound SAML assertion was encrypted. (OKTA-658533)
An error occurred when the value for
postLogoutRedirectUris
in an OpenID Connect app was more than 65,535 characters. (OKTA-627678)Authorize requests with invalid
max_age
parameter values resulted in errors. (OKTA-654751)
Weekly release 2023.10.1
Change | Expected in Preview Orgs |
---|---|
Granular permissions to manage directories is self-service EA in Preview | October 18, 2023 |
Bug fixed in 2023.10.1 | October 24, 2023 |
Granular permissions to manage directories is self-service EA in Preview
This feature enables you to assign permissions to view and manage directories as part of a customized admin role.
Bug fixed in 2023.10.1
The Trusted Origins API didn't validate the origin
parameter correctly. (OKTA-638649)
Monthly release 2023.10.0
Change | Expected in Preview Orgs |
---|---|
Permission conditions for profile attributes is GA in Preview | October 12, 2023 |
Direct authentication endpoints now require channel_hint parameter | October 12, 2023 |
Updates to profile enrollment policy are GA in Production | September 13, 2023 |
Demonstrating Proof-of-Possession is GA | March 15, 2023 |
Bugs fixed in 2023.10.0 | October 12, 2023 |
Permission conditions for profile attributes is GA in Preview
You can now apply conditions to the View users and their details and Edit users' profile attributes custom admin role permissions. Permission conditions help you limit the scope of a role by including or excluding admins' access to individual profile attributes. This gives you more granular control over your custom admin roles and helps meet your org's unique security needs. See Permission conditions (opens new window).
Direct authentication endpoints now require channel_hint parameter
The channel_hint
parameter is now required for direct authentication /oob-authenticate
and /challenge
endpoints.
Updates to profile enrollment policy are GA in Production
This feature delivers parity for upgraded orgs that used the Self-Service Registration (SSR) feature in Classic Engine. Previously in Identity Engine, SSR was combined with profile enrollment. Users were unable to sign in after the upgrade if their org used read-only or hidden attributes for SSR in Classic Engine. Identity Engine now separates SSR and profile enrollment, and turns off progressive profiling by default. This ensures that no admins are locked out and users can sign in to their orgs even if they have special attributes.
Demonstrating Proof-of-Possession is GA
OAuth 2.0 Demonstrating Proof-of-Possession (DPoP) is a security feature that adds an extra layer of protection to OAuth 2.0 access tokens. It enables the client to demonstrate that it possesses a particular key or secret associated with the access token. OAuth 2.0 DPoP can help prevent certain attacks, such as token theft or token replay attacks, where an attacker intercepts a legitimate access token and uses it to gain unauthorized access to a protected resource. See Configure OAuth 2.0 Demonstrating Proof-of-Possession.
Bugs fixed in 2023.10.0
If an org had custom character restrictions on the
login
variable, POST requests to the/idp/idx/enroll/new
endpoint with invalidlogin
values returned an incorrect error message. (OKTA-631952)When an admin configured a custom email domain using the Email Domain API, they couldn't change the autogenerated CNAME record. (OKTA-645037)
The Apps API displayed an error when admins tried to remove the Refresh Token grant type. (OKTA-630471)
An Authentication Policy rule configured with
methods
andtypes
parameters of a possessionconstraint
object, incorrectly prompted users for a security question. (OKTA-642454)The Custom API Action card in Okta Workflows couldn't authenticate requests to
/api/v1/org/factors/yubikey_token/tokens
endpoints. (OKTA-639624)
September
Weekly release 2023.09.2
Change | Expected in Preview Orgs |
---|---|
Bugs fixed in 2023.09.2 | September 27, 2023 |
Bugs fixed in 2023.09.2
SP-initiated SAML flows without a session didn't correctly populate the
context.session
object for SAML inline hooks. (OKTA-648750)The Okta Verify MFA prompt didn't appear when users tried to access the AWS Okta CLI after their Okta session expired. (OKTA-639397)
Weekly release 2023.09.1
Change | Expected in Preview Orgs |
---|---|
Bug fixed in 2023.09.1 | September 20, 2023 |
Bug fixed in 2023.08.1
IdP users were redirected to an unbranded sign-in page after SSO failure. (OKTA-595549)
Monthly release 2023.09.0
Change | Expected in Preview Orgs |
---|---|
Updates to profile enrollment policy | September 13, 2023 |
Automatically assign super admin role to an app | September 13, 2023 |
Authentication challenge for redirects | September 13, 2023 |
Number challenge support for OOB and MFA OOB grant flows is EA in Production | September 13, 2023 |
Policy Simulation API is GA in Preview | September 13, 2023 |
Developer documentation update in 2023.09.0 | September 13, 2023 |
Bugs fixed in 2023.09.0 | September 13, 2023 |
Updates to profile enrollment policy
This feature delivers parity for upgraded orgs that used the Self-Service Registration (SSR) feature in Classic Engine. Previously in Identity Engine, SSR was combined with profile enrollment. Users were unable to sign in after the upgrade if their org used read-only or hidden attributes for SSR in Classic Engine. Identity Engine now separates SSR and profile enrollment, and turns off progressive profiling by default. This ensures that no admins are locked out and users can sign in to their orgs even if they have special attributes.
Automatically assign super admin role to an app
Admins can now automatically assign the super admin role to all of their newly created public client apps. See Work with the admin component (opens new window).
Authentication challenge for redirects
Users now receive an authentication challenge for each redirect sent to an Identity Provider with Factor only configured, even if the IdP session is active.
Number challenge support for OOB and MFA OOB grant flows is EA in Production
Direct authentication out-of-band (OOB) and multifactor out-of-band (MFA OOB) grant flows now support number challenge for Okta Verify Push. See the MFA OOB grant and OOB grant flows.
Policy Simulation API is GA in Preview
With the Policy API /simulate
endpoint, you can quickly and easily test policies and validate whether your desired security outcomes are achieved. This endpoint allows you to simulate user access attributes, such as IP address, device, risk, and so on, to test whether the user is granted access to the specified app. This endpoint is implemented in the Admin Console as the Access Testing Tool (opens new window). The /simulate
endpoint helps you identify potential security risks and compliance issues before you implement a policy. See the Policy API (opens new window) and Test your policies with access simulations.
Developer documentation update in 2023.09.0
- The Sign users in to your web app using the redirect model guide is now easier to read and quicker to complete. This change also removes references to Okta CLI, removes Gin-specific example code from Go content, and adds new example code to ASP.NET content.
- The Style the sign-in page guide now describes how to hide or suppress the transient Sign-In Widget for redirect authentication. See Hide or suppress the transient Sign-In Widget .
Bugs fixed in 2023.09.0
- A token inline hook secured by an OAuth 2.0 private key returned a 403 error response for all users except the super admin. (OKTA-605996)
- Access policy evaluation for custom authorization servers was inconsistent when default scopes were used. (OKTA-627559)
- Admins couldn't make requests to MyAccount API (
/idp/myaccount/
) endpoints. (OKTA-632620)
August
Weekly release 2023.08.3
Change | Expected in Preview Orgs |
---|---|
Bug fixed in 2023.08.3 | August 30, 2023 |
Bug fixed in 2023.08.3
The Access Simulation endpoint of the Policy API returned access to applications even though the authenticator enrollment was denied. (OKTA-622753)
Weekly release 2023.08.2
Change | Expected in Preview Orgs |
---|---|
Bug fixed in 2023.08.2 | August 29, 2023 |
Bug fixed in 2023.08.2
When configuring an API Service Integration (either through the Admin Console or using APIs), you could set a JWKS URL using HTTP instead of HTTPS. (OKTA-601623)
Weekly release 2023.08.1
Change | Expected in Preview Orgs |
---|---|
Custom admin roles with device permissions is EA in Preview | August 16, 2023 |
Bugs fixed in 2023.08.1 | August 16, 2023 |
Custom admin roles with device permissions is EA in Preview
You can now create custom admin roles with permissions to view and manage devices. You can add the Devices resource (opens new window) to your resource set and then specify device permissions (opens new window) for your custom admin.
Bugs fixed in 2023.08.1
- The Active Directory agent version returned by
/api/v1/agentPools/update
was in the formatx.y.z.a
instead of the expectedx.y.z
. (OKTA-597796) - Federated users were unable to sign in to an app due to incorrect AMR value mapping when Trust AMR claims from this Identity Provider was enabled. (OKTA-604248)
- Removing the
emailAuthenticationLink
variable from the email template didn't update the Sign-In Widget. (OKTA-627533) - OpenID Connect
/token
requests using the SAML 2.0 Assertion grant type flow failed if the SAML assertion expiry was greater than 30 days. (OKTA-632131) - The Access Testing Tool (Policy simulation operations (opens new window)) results showed an incorrect value for the profile enrollment self-service registration option. (OKTA-635787)
Monthly release 2023.08.0
Change | Expected in Preview Orgs |
---|---|
API validation of Agent Pools update requests | August 10, 2023 |
Authentication challenge for redirects is GA in Preview | August 10, 2023 |
Policy Simulation API is GA in Preview | June 14, 2023 |
Developer documentation updates in 2023.08.0 | August 10, 2023 |
Bugs fixed in 2023.08.0 | August 10, 2023 |
API validation of Agent Pools update requests
The following fields are required for Agent Pools update requests (POST /api/v1/agentPools/{poolId}/updates
and
POST /api/v1/agentPools/{poolId}/updates/{updateId}
):
- 'agent'
- 'name'
- 'agentType'
An API validation exception occurs if any of these fields are missing from the request.
Authentication challenge for redirects is GA in Preview
Users now receive an authentication challenge for each redirect sent to an Identity Provider with Factor only configured, even if the IdP session is active.
Policy Simulation API is GA in Preview
With the Policy API /simulate
endpoint, you can quickly and easily test policies and validate whether your desired security outcomes are achieved. This endpoint allows you to simulate user access attributes, such as IP address, device, risk, and so on, to test whether the user is granted access to the specified app. This endpoint is implemented in the Admin Console as the Access Testing Tool (opens new window). The /simulate
endpoint helps you identify potential security risks and compliance issues before you implement a policy. See the Policy API (opens new window) and Test your policies with access simulations.
Developer documentation updates in 2023.08.0
New multibrand content is available that describes the behaviour of branded emails and when to trigger them from the Admin Console or from the APIs.
A new Terraform section is available that includes content for using Terraform to automate the management of your Okta org. These guides range from a Terraform overview to optimizing Terraform access in your Okta org. Additionally, there is content for managing user access, groups, and authentication services, customizing the end-user experience, and controlling Terraform access to your Okta org.
Bugs fixed in 2023.08.0
- Custom Push Factors used the same
provider
andvendorName
properties as Okta Verify. These factors now return theprovider
asCUSTOM
and thevendorName
as the name of the authenticator. (OKTA-598598) - Some of the endpoints of the Resource Sets API (opens new window) didn't support
self
andnext
link relation types. (OKTA-571339) - The Users API didn't validate the
saltOrder
property when creating or updating users with salted hashed passwords. (OKTA-602124) - Users that were provisioned through an IdP could be assigned the Super Admin role due to previous permission checks in group assignments. (OKTA-597974)
July
Weekly release 2023.07.1
Change | Expected in Preview Orgs |
---|---|
Bug fixed in 2023.07.1 | July 26, 2023 |
Bug fixed in 2023.07.1
Requests to the /authorize
endpoint failed when the request contained ASCII characters (%00
) as the scope value. (OKTA-465695)
Monthly release 2023.07.0
Change | Expected in Preview Orgs |
---|---|
Front-channel Single Logout is Self-Service EA in Preview | July 12, 2023 |
Google Authenticator for account recovery is GA in Production | June 14, 2023 |
Okta-generated client secret length increase | July 12, 2023 |
Smart Card authenticator is Self-Service GA in Preview | January 19, 2023 |
ThreatInsight coverage on core Okta API endpoints is GA in Preview | July 12, 2023 |
Developer documentation update in 2023.07.0 | July 12, 2023 |
Bugs fixed in 2023.07.0 | July 12, 2023 |
Front-channel Single Logout is Self-Service EA in Preview
Front-channel Single Logout (SLO) allows a user to sign out of an SLO participating app on their device and end their Okta session. Okta then automatically sends a logout request to all other participating apps that the user accessed during their session. See Configure Single Logout.
Google Authenticator for account recovery is GA in Production
The Policy API Self-Service Password Reset object can now use Google Authenticator to initiate recovery scenarios. Previously, the object could only use the Email, Phone, or Okta Verify authenticators to initiate recovery. This addition enhances the user experience by increasing the number of options available for recovery. See Policy API (opens new window).
Okta-generated client secret length increase
The length of Okta-generated client secrets has been increased from 40 to 64 characters.
Smart Card authenticator is Self-Service GA in Preview
You can add a new Smart Card authenticator that enables Personal Identity Verification (PIV) to be used in authentication policies. You can also restrict the authentication policies to use only the Smart Card authenticator as MFA. See properties.additionalAmr
in the updated Identity Provider (opens new window) attributes for X509
Smart Card support.
ThreatInsight coverage on core Okta API endpoints is GA in Preview
Okta ThreatInsight coverage is now available for core Okta API endpoints (OIDC & OAuth 2.0 (opens new window), Okta Management (opens new window), and MyAccount APIs (opens new window)). Based on heuristics and machine learning models, ThreatInsight maintains an evolving list of IP addresses that consistently show malicious activity across Okta's customer base. Requests from these bad IP addresses can be blocked or elevated for further analysis when ThreatInsight is enabled for an Okta org. Previously, ThreatInsight coverage only applied to Okta authentication endpoints (including enrollment and recovery endpoints). With this release, enhanced attack patterns are detected for authentication endpoints and limited attack patterns are also detected for non-authentication endpoints. There are no changes to the existing ThreatInsight configuration: you can still enable ThreatInsight with log and block mode, log mode, and exempt network zones. A new Negative IP Reputation
reason is available for high security.threat.detected
events. See System Log events for Okta ThreatInsight (opens new window).
Developer documentation update in 2023.07.0
The guides within the Primer for OIN OpenID Connect section have been removed. Content for OIDC protocol requirements, multi-tenancy, and best practices have been updated and merged to the Overview of Single Sign-On in the OIN and Build an SSO integration guides.
Bugs fixed in 2023.07.0
- Sometimes HTTP response headers contained duplicate session ID references. (OKTA-621625)
- Smart Card authenticator responses returned multiple indistinguishable enrollments. (OKTA-556787)
June
Weekly release 2023.06.2
Change | Expected in Preview Orgs |
---|---|
New IdP permissions for custom admin roles is EA in Preview | July 6, 2023 |
Bugs fixed in 2023.06.2 | July 6, 2023 |
New IdP permissions for custom admin roles is EA in Preview
Admins can now leverage new Identity Provider management permissions when creating custom admin roles. These permissions allow more precise access control and reinforce the principle of least privilege. See Roles (opens new window).
Bugs fixed in 2023.06.2
- The
max_age=0
property wasn't treated the same asprompt=login
for OAuth 2.0/authorize
requests. (OKTA-588559) - A delete session request (
/api/v1/sessions/me
) didn't clear the session cookie (sid
). (OKTA-620986) - When the List all Trusted Origins API was called with a
filter
onstatus
, an error was returned. (OKTA-622646)
Weekly release 2023.06.1
Change | Expected in Preview Orgs |
---|---|
Bug fixed in 2023.06.1 | June 22, 2023 |
Bug fixed in 2023.06.1
ID tokens retrieved using Direct Authentication grant types contained an incorrect AMR. (OKTA-616876)
Monthly release 2023.06.0
Change | Expected in Preview Orgs |
---|---|
API service integration client secret rotation | June 14, 2023 |
Multibrand customizations are GA in Production | February 8, 2023 |
Pagination for the Brands API is GA in Production | June 14, 2023 |
New custom authenticator for push notifications | June 14, 2023 |
Unique refresh token ID added to token inline hook requests | June 14, 2023 |
Transactional verification with CIBA is GA in Production | June 14, 2023 |
Password hooks global availability is GA in Production | December 20, 2020 |
Google Authenticator for account recovery is now EA in Preview | June 14, 2023 |
Policy Simulation API is EA in Preview | June 14, 2023 |
Universal Directory attribute and enum limits are GA in Production | June 14, 2023 |
Developer documentation update in 2023.06.0 | June 14, 2023 |
Bugs fixed in 2023.06.0 | June 14, 2023 |
API service integration client secret rotation
New in this release is the ability to rotate client secrets for an API service integration through the API. Previously, if a customer wanted to update the client secret for an API service integration, they would have to reinstall the integration to obtain a new client ID and secret. There was no option to revoke the client secret while maintaining the client ID and API service integration instance in Okta. With this new feature, customers can generate a new secret, deactivate an old secret, and remove a deactivated secret from the API service integration instance. These functionalities help customers implement security best practices without service downtime. See API Service Integration (opens new window) API references.
Multibrand customizations are GA in Production
Multibrand customizations allow customers to use one org to manage multiple brands and multiple custom domains. This drastically simplifies multi-tenant architectures where customers create multiple orgs to satisfy branding requirements. Multibrand customizations allow orgs to create up to three custom domains (more upon request), which can be mapped to multiple sign-in pages, multiple sets of emails, error pages, and multiple versions of the End-User Dashboard. See Brands.
Pagination for the Brands API is GA in Production
The Brands API now supports pagination (opens new window) when returning brand lists. Previously, users would get a list of all brands in the org. With pagination, users receive 20 records per page. See Brands (opens new window).
New custom authenticator for push notifications
Before now, Okta Verify was the only solution for using push notifications and biometrics as part of your Okta user verification strategy. Now, we have the Devices SDK, which lets you embed push notifications and biometric verification inside your organization's mobile apps. Your users are presented with a push and biometric experience within your organization's apps, with your organization's branding on it. They never have to leave your app, and they don't need to download a third-party app, such as Okta Verify, to complete their verification. See the Custom authenticator integration guide for Android and iOS instructions.
Unique refresh token ID added to token inline hook requests
A unique refresh token ID is now included in token inline hook requests. This ensures that the refresh token ID is persisted in the request to maintain seamless access and improve security. This feature is now GA in production.
Transactional verification with CIBA is GA in Production
Organizations are constantly looking for ways to offer a frictionless user experience without compromising security. It becomes even more challenging when the users try to perform sensitive transactions. Okta uses Client-Initiated Backchannel Authentication (CIBA) to provide customers with a simple and secure transaction verification solution.
CIBA extends OpenID Connect to define a decoupled flow where the authentication or transaction flow is initiated on one device and verified on another. The device in which the transaction is initiated by the OIDC application is called the consumption device, and the device where the user verifies the transaction is called the authentication device. See Transactional verification using CIBA.
Password hooks global availability is GA in Production
The Create User with password import inline hook (opens new window) operation is now available for all users. Previously, password hooks required a user to be in the STAGED
status. This change helps better support migration efforts from DelAuth to Okta.
Google Authenticator for account recovery is now EA in Preview
The Policy API Self-Service Password Reset object can now use Google Authenticator to initiate recovery scenarios. Previously, the object could only use the Email, Phone, or Okta Verify authenticators to initiate recovery. This addition enhances the user experience by increasing the number of options available for recovery. See Policy API (opens new window).
Policy Simulation API is EA in Preview
With the Policy API /simulate
endpoint, you can quickly and easily test policies and validate whether your desired security outcomes will be achieved. This endpoint allows you to simulate user access attributes, such as IP address, device, risk, and so on, to test whether the user will be granted access to the specified app. This endpoint is implemented in the Admin Console as the Access Testing Tool (opens new window). The/simulate
endpoint helps you identify potential security risks and compliance issues before you implement a policy. See Policy API (opens new window) and Test your policies with access simulations.
Universal Directory attribute and enum limits are GA in Production
Universal Directory now has limits to the number of attributes per org and the number of enums that can be defined for a single attribute.
Developer documentation update in 2023.06.0
A new policy testing guide is available to demonstrate a new Policy API endpoint used to test access policies. This feature is also available in the Admin Console > Reports as the Access Testing Tool. See the new simulate endpoint (opens new window) in the API reference and Test your policies with access simulations.
Bugs fixed in 2023.06.0
- Sometimes requests with an already used scope name didn't return appropriate error messages. (OKTA-570908)
- Some customers received a 500 internal server error in response to a List all apps request. (OKTA-597493)
- Unhelpful error messages appeared when the
NameIdPolicy
was unspecified in SAML client requests that required signed requests. (OKTA-607434) - When labels for Universal Directory properties on the profile enrollment form were customized, the sign-in page showed default content. (OKTA-397225)
- The Identity Provider (IdP) AMR claims mapping feature ignored the IdP admin configuration for trusting AMR claims. (OKTA-615412)
- The
max_age=0
property wasn't treated the same asprompt=login
for OAuth 2.0/authorize
requests. (OKTA-588559)
May
Weekly release 2023.05.3
Change | Expected in Preview Orgs |
---|---|
Bugs fixed in 2023.05.3 | June 07, 2023 |
Bugs fixed in 2023.05.3
- Requests to the Email Domains API (DELETE /email-domains/{emailDomainId}) failed if the same domain name was used by multiple orgs. (OKTA-612312)
- Some attributes previously added to user profiles from incoming SAML responses weren't cleared when the attribute was later omitted. (OKTA-609021)
- The Begmati Nepal region (
NP
) was missing from the Dynamic Zonelocations
property. (OKTA-605016)
Weekly release 2023.05.2
Change | Expected in Preview Orgs |
---|---|
MyAccount API password update and 2FA support is EA in Preview | May 24, 2023 |
AMR Claims Mapping for IdPs is EA in Preview | May 24, 2023 |
Bug fixed in 2023.05.2 | May 24, 2023 |
MyAccount API password update and 2FA support is EA in Preview
You can now use the MyAccount API (opens new window) to update passwords. Previously, you could only update non-authenticator attributes like first name or last name with the API. Also, Okta enforces 2FA for users that enroll any factor using the API.
Bug fixed in 2023.05.2
Token inline hooks failed even when a URL claim name was correctly encoded with a JSON pointer. (OKTA-602794)
Weekly release 2023.05.1
Change | Expected in Preview Orgs |
---|---|
Bugs fixed in 2023.05.1 | May 17, 2023 |
Bugs fixed in 2023.05.1
Users attempting to sign in to an app weren't prompted to sign in at the SAML Identity Provider when
prompt=login
andidp={IdP}
were passed in the/authorize
request. (OKTA-601342)Calling
/api/v1/groups/groupId/apps
with the Okta Administrators Group ID returned a 403 error code. (OKTA-606150)
Monthly release 2023.05.0
Change | Expected in Preview Orgs |
---|---|
OAuth 2.0 On-Behalf-Of Token Exchange is GA in Production | February 8, 2023 |
Multibrand customizations are GA in Preview | February 8, 2023 |
Password hooks global availability is GA in Preview | December 20, 2020 |
Unique refresh token ID added to token inline hook requests | May 11, 2023 |
Event hook filtering is EA in Preview | May 11, 2023 |
The new Direct Authentication API is EA in Preview | May 11, 2023 |
Identity store property for the Applications API | May 3, 2023 |
Additional measures to counter toll fraud | May 11, 2023 |
Developer documentation update in 2023.05.0 | May 11, 2023 |
Bugs fixed in 2023.05.0 | May 11, 2023 |
OAuth 2.0 On-Behalf-Of Token Exchange is GA in Production
OAuth 2.0 On-Behalf-Of Token Exchange helps retain the user context in requests to downstream services. It provides a protocol approach to support scenarios where a client can exchange an access token received from an upstream client with a new token by interacting with the authorization server. See Set up OAuth 2.0 On-Behalf-Of Token Exchange.
Multibrand customizations are GA in Preview
Multibrand customizations allow customers to use one org to manage multiple brands and multiple custom domains. This drastically simplifies multi-tenant architectures where customers create multiple orgs to satisfy branding requirements. Multibrand customizations allow orgs to create up to three custom domains (more upon request), which can be mapped to multiple sign-in pages, multiple sets of emails, error pages, and multiple versions of the End-User Dashboard. See Brands.
Password hooks global availability is GA in Preview
The Create User with password import inline hook (opens new window) operation is now available for all users. Previously, password hooks required a user to be in the STAGED
status. This change helps better support migration efforts from DelAuth to Okta.
Event hook filtering is EA in Preview
You can now filter individual events of the same event type based on custom business logic hosted in Okta. These filters reduce the number of events that trigger hooks, removing an unnecessary load on your external service.
This feature includes an improved creation workflow for event hooks and a new Filters tab that you can use to create event filters with direct Expression Language statements or with a simple UI format.
Using event hook filters significantly reduces the amount of event hook requests and the need for custom code on your respective services. See Which events are eligible and Event hook filtering.
The new Direct Authentication API is EA in Preview
The Direct Authentication API (opens new window) offers a new set of OAuth grants that give app developers greater control over the authentication process. When redirect authentication isn't an option, you can use this API to allow client apps to authenticate users directly, without relying on HTTP redirection through a web browser. This is beneficial in scenarios where there's a high degree of trust between the user and the app. It's also beneficial where browser-based flows aren't feasible, like with mobile apps. By using the Direct Authentication API, app developers can tailor the authentication experience to their specific use case, resulting in a smoother and more efficient authentication process. See Configure Direct Authentication grant types.
Identity store property for the Applications API
A new identityStoreId
property is now available in the App API resource (/api/v1/apps
) to store an identity store app associated with your app. You can set the identityStoreId
value to the id
of the identity store app you previously created in the same org. See the optional settings.identityStoreId
property (opens new window).
Unique refresh token ID added to token inline hook requests
A unique refresh token ID is now included in token inline hook requests. This ensures that the refresh token ID is persisted in the request to maintain seamless access and improve security.
Additional measures to counter toll fraud
For SMS and voice authentications, additional mitigation measures now help counter phone number-based toll fraud.
Developer documentation update in 2023.05.0
A new event hook guide is available that demonstrates the self-service EA feature event hook filtering. Filter only those event instances you want to trigger an event hook. See Event hook filtering.
Bugs fixed in 2023.05.0
- When an org upgraded to Identity Engine, MyAccount API calls to delete an unverified phone number (
DELETE /idp/myaccount/phones/{id}
) failed. (OKTA-586685) - Admins saw Okta FastPass listed in the
GET /api/v1/users//factors
response for users who didn't enable the factor. (OKTA-587429)
April
Weekly release 2023.04.3
Change | Expected in Preview Orgs |
---|---|
Bugs fixed in 2023.04.3 | May 3, 2023 |
Bugs fixed in 2023.04.3
Signed SAML requests weren't validated correctly when the
relayState
was set tonull
. (OKTA-597738)An API request to retrieve app instances (GET
/api/v1/apps/
) returned a large custom payload in thesettings.app.domains
property for an Office 365 app instance. (OKTA-593595)
Weekly release 2023.04.2
Change | Expected in Preview Orgs |
---|---|
Bugs fixed in 2023.04.2 | April 26, 2023 |
Bugs fixed in 2023.04.2
When the sign-in page was edited using the code editor, the event type
system.custom_error.update
was logged. (OKTA-591800)The Policy API
constraints
object could be set with thetypes
andmethods
of disabled authenticators or methods. (OKTA-586221)A
next
link wasn't returned when a List Identity Providers request was made and a limit of 200 was set. (OKTA-597359)When the API Service Integration feature is disabled, a query for inactive app integrations incorrectly returned a list with revoked API service integrations. (OKTA-596437)
A session wasn't properly established when an
/authorize
request specifiedprompt=none
and included asessionToken
acquired during user activation. (OKTA-594051)In Okta Expression Language,
user.status
returned incorrect values. (OKTA-599024)
Weekly release 2023.04.1
Change | Expected in Preview Orgs |
---|---|
Bugs fixed in 2023.04.1 | April 12, 2023 |
Bugs fixed in 2023.04.1
- Orgs with Multibrand enabled couldn't add the same custom email domain that they'd previously deleted. (OKTA-587938)
- Token exchange errors occurred when users selected Keep me signed in during sign-in flows for Native SSO or the Okta AWS CLI. (OKTA-571266)
Monthly release 2023.04.0
Change | Expected in Preview Orgs |
---|---|
Support added for DPoP with service apps | April 05, 2023 |
OAuth 2.0 authentication for inline hooks is GA in Production | October 05, 2022 |
API service integrations are GA in Production | November 03, 2022 |
OIN Manager support for Workflow Connector submission is GA in Production | March 08, 2023 |
OAuth 2.0 grant scopes added | April 05, 2023 |
Scope parameter length increased | April 05, 2023 |
OAuth 2.0 On-Behalf-Of Token Exchange is GA in Preview | February 08, 2023 |
Configurable rate limits for OAuth 2.0 apps is GA in Production | March 08, 2023 |
Developer documentation update in 2023.04.0 | April 05, 2023 |
Bug fixed in 2023.04.0 | April 05, 2023 |
Support added for DPoP with service apps
Okta now supports Demonstrating Proof-of-Possession for service apps. However, service apps can provide the same level of security by using private_key_jwt
for client authentication (opens new window).
OAuth 2.0 authentication for inline hooks is GA in Production
Okta inline hook calls to third-party external web services previously provided only header-based authentication for security. Although sent with SSL, the header or custom header authentication didn't meet more stringent security requirements for various clients and industries.
To improve the security of inline hooks, Okta now supports authentication with OAuth 2.0 access tokens. Tokens ensure secure calls to external web services.
When creating inline hooks in the Admin Console (or by API), administrators or developers can now select OAuth 2.0 authentication and choose between two methods of OAuth 2.0: Client Secret or Private Key. A new Key Management API and Admin Console page is also available to create public/private key pairs for use with OAuth 2.0 inline hooks. See Key management (opens new window).
Using the OAuth 2.0 framework provides better security than Basic Authentication or custom headers, and is less work than setting up an IP allowlisting solution. Clients also have the ability to use access tokens minted by their own custom authorization servers to guarantee that Okta is calling their client web services and isn't triggered by any external actors. See Add an inline hook (opens new window).
API service integrations are GA in Production
A service-to-service app where a backend service or a daemon calls Okta management APIs for a tenant (Okta org) can be published in the Okta Integration Network (OIN) as an API service integration. This integration type allows your service app to access your customer Okta org through Okta management APIs using the OAuth 2.0 Client Credentials flow. API service integrations provide secure, reliable, and least-privilege scoped access to Okta APIs without being associated with a user, so service isn't disrupted when the user is no longer involved with service integration activities. See API service integrations in the OIN. OIN Manager has been updated to support testing and submitting API service integrations. After your service integration is published in the OIN, workforce customers can discover and configure your integration with ease. See Build an API service integration.
OIN Manager support for Workflow Connector submission is GA in Production
Okta Workflows (opens new window) is a no-code, if-this-then-that logic builder that Okta orgs can use to automate custom or complex employee onboarding and offboarding flows in your application. You can now publish Workflow connectors that you create with the Workflows Connector Builder (opens new window) in the Okta Integration Network (OIN) catalog. Publishing a Workflows connector with Okta allows your customers to deeply integrate your product with all other connectors in the catalog. Submit your Workflow connector by using the OIN Manager. See Submit an integration for Workflows connectors.
OAuth 2.0 grant scopes added
The OAuth 2.0 okta.appGrants.manage
and okta.appGrants.read
grant scopes are now available for use with the /apps/{id}/grants
and /apps/{id}/grants/{grantId}
endpoints.
Scope parameter length increased
The maximum length for the scope parameter of a refresh token request is now 4096 characters.
OAuth 2.0 On-Behalf-Of Token Exchange is GA in Preview
OAuth 2.0 On-Behalf-Of Token Exchange helps retain the user context in requests to downstream services. It provides a protocol approach to support scenarios where a client can exchange an access token received from an upstream client with a new token by interacting with the authorization server. See Set up OAuth 2.0 On-Behalf-Of Token Exchange.
Configurable rate limits for OAuth 2.0 apps is GA in Production
Rate limit violations mainly occur on authenticated endpoints. Currently, it isn't clear which OAuth 2.0 authenticated app consumes all the rate limits for an org. This increases the risk that one app consumes the entire rate limit bucket. To avoid this possibility, Okta admins can now configure how much rate limit capacity an individual OAuth 2.0 app can consume by editing the Application rate limits tab for each app. By setting a capacity on individual OAuth 2.0 apps, Okta admins have a new tool to monitor and investigate rate limit violations, and have the ability to view rate limit traffic generated by individual OAuth 2.0 apps. See Rate limit dashboard bar graph.
Developer documentation update in 2023.04.0
A new sign-in redirect guide is available for single page apps (SPA) using JavaScript and the Auth JS SDK. No frontend framework required! A quick and easy demonstration of the redirect sign-in flow. See Sign users in to your SPA using the redirect model and Auth JS.
Bug fixed in 2023.04.0
The Identity Sources API bulk upsert operation accepted an empty profile payload. (OKTA-533011)
March
Weekly release 2023.03.3
Change | Expected in Preview Orgs |
---|---|
Bugs fixed in 2023.03.3 | March 29, 2023 |
Bugs fixed in 2023.03.3
- App sign-on events with usernames that exceeded 100 characters weren't always added to the System Log. (OKTA-585478)
- CSV values that could trigger a computation weren't escaped in the
User-Agent
string. (OKTA-452381) - The groups count on the Admin Dashboard was incorrect. (OKTA-592512)
- Some validations weren't enforced when requests were made to the Apps API. (OKTA-585354)
Weekly release 2023.03.2
Change | Expected in Preview Orgs |
---|---|
Bugs fixed in 2023.03.2 | March 22, 2023 |
Bugs fixed in 2023.03.2
Sometimes, groups with a
status
of INACTIVE were synchronized with the reporting database as ACTIVE. (OKTA-589084)Requests to the Policies API (
PUT /policies/{defaultIdpPolicy}/rules/{IdpRule}
) with an emptyuserIdentifier
parameter returned an HTTP 500 Internal Server error. (OKTA-565856)Admins were able to modify the
auth_time
claim for an access token using a token inline hook. (OKTA-503099)
Weekly release 2023.03.1
Change | Expected in Preview Orgs |
---|---|
Demonstrating Proof-of-Possession is self-service EA in Preview | March 15, 2023 |
Bug fixed in 2023.03.1 | March 15, 2023 |
Demonstrating Proof-of-Possession is self-service EA in Preview
OAuth 2.0 Demonstrating Proof-of-Possession (DPoP) is a security feature that adds an extra layer of protection to OAuth 2.0 access tokens. It enables the client to demonstrate that it possesses a particular key or secret associated with the access token. OAuth 2.0 DPoP can help prevent certain attacks, such as token theft or token replay attacks, where an attacker intercepts a legitimate access token and uses it to gain unauthorized access to a protected resource. See Configure OAuth 2.0 Demonstrating Proof-of-Possession.
Bug fixed in 2023.03.1
Using the Policy API, admins were able to set the MFA_ENROLL
policy factor settings to allow Okta Verify Push but not allow Okta Verify OTP at the same time. (OKTA-567906)
Monthly release 2023.03.0
Change | Expected in Preview Orgs |
---|---|
Configurable rate limits for OAuth 2.0 apps is GA in Preview | March 08, 2023 |
Authenticator enrollment using the /authorize endpoint is GA in Production | November 03, 2022 |
OIDC Identity Providers private/public key pair support is GA | June 08, 2022 |
API service integrations are GA in Preview | November 03, 2022 |
Log Streaming is GA in Production | March 30, 2022 |
Optional consent for OAuth 2.0 scopes is GA in Production | January 11, 2023 |
OAuth 2.0 authentication for inline hooks is GA in Preview | October 05, 2022 |
Improvements to self-service account activities for AD and LDAP users | November 30, 2022 |
Honor force authentication support for SAML Apps API | March 08, 2023 |
OIN Manager support for Workflow Connector submission is GA in Preview | March 08, 2023 |
Rate limit increased for Event Hooks | March 08, 2023 |
Bug fixed in 2023.03.0 | March 08, 2023 |
Configurable rate limits for OAuth 2.0 apps is GA in Preview
Rate limit violations mainly occur on authenticated endpoints. Currently, it isn't clear which OAuth 2.0 authenticated app consumes all the rate limits for an org. This increases the risk that one app consumes the entire rate limit bucket. To avoid this possibility, Okta admins can now configure how much rate limit capacity an individual OAuth 2.0 app can consume by editing the Application rate limits tab for each app. By setting a capacity on individual OAuth 2.0 apps, Okta admins have a new tool to monitor and investigate rate limit violations, and have the ability to view rate limit traffic generated by individual OAuth 2.0 apps. See Rate limit dashboard bar graph.
Authenticator enrollment using the /authorize endpoint is GA in Production
Authenticator enrollment provides a standardized way for a user to enroll a new authenticator using the OAuth /authorize
endpoint. This feature uses query parameters such as prompt and enroll_amr_values
to specify which authenticator the user wants to enroll. It also automatically verifies at least two factors as long the user has already enrolled two or more factors.
OIDC Identity Providers private/public key pair support is GA
Previously, Okta only supported the use of client secret as the client authentication method with an OpenID Connect-based Identity Provider. Okta now supports the use of private/public key pairs (private_key_jwt
) with OpenID Connect-based Identity Providers. Additionally, the Signed Request Object now also supports the use of private/public key pairs. See Create an Identity Provider in Okta.
API service integrations are GA in Preview
A service-to-service app where a backend service or a daemon calls Okta management APIs for a tenant (Okta org) can be published in the Okta Integration Network (OIN) as an API service integration. This integration type allows your service app to access your customer Okta org through Okta management APIs using the OAuth 2.0 Client Credentials flow. API service integrations provide secure, reliable, and least-privilege scoped access to Okta APIs without being associated with a user, so service isn't disrupted when the user is no longer involved with service integration activities. See API service integrations in the OIN. OIN Manager has been updated to support testing and submitting API service integrations. After your service integration is published in the OIN, workforce customers can discover and configure your integration with ease. See Build an API service integration.
Log Streaming is GA in Production
Many organizations use third-party systems to monitor, aggregate, and act on the event data in Okta System Log events.
Log Streaming enables Okta admins to more easily and securely send System Log events to a specified system, such as the Splunk Cloud or Amazon Eventbridge, in near real time with simple, pre-built connectors. Log streaming scales well even with high event volume, and unlike many existing System Log event collectors, it doesn't require a third-party system to store an Okta Admin API token. See Log Streaming API (opens new window).
Optional consent for OAuth 2.0 scopes is GA in Production
OAuth 2.0 Optional consent provides an optional property that enables a user to opt in or out of an app's requested OAuth scopes. When optional is set to true for a scope, the user can skip consent for that scope. See Request user consent.
OAuth 2.0 authentication for inline hooks is GA in Preview
Okta inline hook calls to third-party external web services previously provided only header-based authentication for security. Although sent with SSL, the header or custom header authentication didn't meet more stringent security requirements for various clients and industries.
To improve the security of inline hooks, Okta now supports authentication with OAuth 2.0 access tokens. Tokens ensure secure calls to external web services.
When creating inline hooks in the Admin Console (or by API), administrators or developers can now select OAuth 2.0 authentication and choose between two methods of OAuth 2.0: Client Secret or Private Key. A new Key Management API and Admin Console page is also available to create public/private key pairs for use with OAuth 2.0 inline hooks. See Key management (opens new window).
Using the OAuth 2.0 framework provides better security than Basic Authentication or custom headers, and is less work than setting up an IP allowlisting solution. Clients also have the ability to use access tokens minted by their own custom authorization servers to guarantee that Okta is calling their client web services and isn't triggered by any external actors. See Add an inline hook (opens new window).
Improvements to self-service account activities for AD and LDAP users
Previously, the self-service unlock (SSU) and self-service password reset (SSPR) flows created unnecessary friction for AD and LDAP users. This feature enhancement introduces a seamless magic link experience in emails sent to unlock accounts and reset passwords. Users no longer need to provide consent when using the same browser. In addition, after successfully unlocking their account, clicking the email magic link counts towards the application's assurance policy. After the assurance requirements are met, the user is signed directly in to the application. These improvements are now GA in Preview. See Customize email notifications.
Honor force authentication support for SAML Apps API
Previously, the Honor Force Authentication parameter (honorForceAuthn
) could only be set from the SAML 2.0 App Integration Wizard (opens new window). When this property is set to true
, users are prompted for their credentials when a SAML request has the ForceAuthn
attribute set to true
. You can now set this property for your SAML app without using the app integration wizard. See the SAML 2.0 settings parameters in the Apps API (opens new window).
OIN Manager support for Workflow Connector submission is GA in Preview
Okta Workflows (opens new window) is a no-code, if-this-then-that logic builder that Okta orgs can use to automate custom or complex employee onboarding and offboarding flows in your application. You can now publish Workflow connectors that you create with the Workflows Connector Builder (opens new window) in the Okta Integration Network (OIN) catalog. Publishing a Workflows connector with Okta allows your customers to deeply integrate your product with all other connectors in the catalog. Submit your Workflow connector by using the OIN Manager. See Submit an integration for Workflows connectors.
Rate limit increased for Event Hooks
The number of events that can be delivered to Event Hooks is now 400,000 events per org, per day. See Rate limits (opens new window).
Bug fixed in 2023.03.0
When an admin used a group limit in an expression that was greater than 100 (for example, Groups.startsWith("active_directory","",500)
), /userinfo endpoint requests failed. (OKTA-576414)
February
Weekly release 2023.02.2
Change | Expected in Preview Orgs |
---|---|
Bugs fixed in 2023.02.2 | March 02, 2023 |
Bugs fixed in 2023.02.2
Some event hook requests failed to send in Preview orgs. (OKTA-578439)
Events weren't logged in the System Log when the Users API (
DELETE /users/{userId}/clients/{clientId}/tokens/{tokenId}
) was used to revoke refresh tokens. (OKTA-574992)During an app request to the
/authorize
endpoint, users not assigned to the app could enroll an authenticator. (OKTA-575258)Pagination and search query matching didn't work as expected when a list request was made using the
/idps
API. (OKTA-577464)Some non-super admins could manage group memberships of admin groups with custom roles. (OKTA-577807)
Weekly release 2023.02.1
Change | Expected in Preview Orgs |
---|---|
Bugs fixed in 2023.02.1 | February 15, 2023 |
Bugs fixed in 2023.02.1
A request to list all security questions (
/users/{userId}/factors/questions
) returned an unexpected question with an error in the response. (OKTA-525478)Case sensitivity caused usernames sent in SAML 2.0 IdP assertions not to match usernames in the destination org if a custom IdP factor was used and the name ID format was unspecified. (OKTA-565984)
Some requests to the
/devices?expand=users&search=profile.platform
endpoint didn't includeexpand=user
in the response. (OKTA-558994)Some users weren't able to re-enroll an account in Okta Verify that was previously unenrolled with another mechanism that used the Factors API. (OKTA-573421)
The YubiKey Report wasn't generated when certain report filters were applied. (OKTA-561269)
Monthly release 2023.02.0
Allowlist for FIDO2 (WebAuthn) authenticators is Self-Service EA in Preview
Okta now enables you to manage which FIDO2 WebAuthn authenticators are allowed in your org for new enrollments. This feature allows you to create an allow list of specific FIDO2 WebAuthn authenticators (based on FIDO Metadata Service) that can be used in enrollment policies. This allows admins to have greater control over which authenticators may be used in their orgs and determine which users may access them in a granular way. See settings.authenticators.constraints
in the MFA_ENROLL
Policies API (opens new window).
Applications API support for SAML metadata attributes
The Apps API now supports metadata dynamic SAML attributes inherited from the SAML app. The SAML attributes are used to manage configured group attributes. The Admin Console displays the dynamic SAML attributes as Configure SAML Attributes, and the API returns these attributes as the settings.signOn.configuredAttributeStatements
property in the SAML application object (opens new window).
Authenticator enrollment using the /authorize endpoint is GA in Preview
Authenticator enrollment provides a standardized way for a user to enroll a new authenticator using the OAuth /authorize
endpoint. This feature uses query parameters such as prompt and enroll_amr_values
to specify which authenticator the user wants to enroll. It also automatically verifies at least two factors as long the user has already enrolled two or more factors.
Custom app login is GA in Production
Custom app login is now available to limited customers in Identity Engine. Only orgs that actively used this feature in Classic Engine before they upgraded may continue to do so. Orgs that don't use custom app login should continue to use the Okta-hosted sign-in experience or configure IdP routing rules (opens new window) that redirect users to the appropriate app to sign in.
Factors API support for Okta Verify authenticator enrollment flows is GA in Production
Identity Engine now supports Okta Verify enrollments with email or SMS links created from the Factors API. Previously, when a client generated an Okta Verify enrollment email or SMS link using the Factors API, the enrollment from the Okta Verify app failed with an Invalid Token
error. To address this issue, Factors API updates include the following behaviors when the Okta Verify authenticator is used:
- When an Okta Verify enrollment request is made using the Factors API for a user not currently enrolled with an Okta Verify factor, then all three
signed_nonce
,push
, andtotp
factors are enrolled. - The GET factors operation lists all Okta Verify enrollment methods for a user.
- The DELETE
push
orsigned_nonce
factor operation deletes all three factor enrollments (push
,signed_nonce
, andtotp
).
See Enroll Okta Verify Push (opens new window) and Unenroll Factor (opens new window) updates in the Factors API.
Full-featured code editor is GA in Production
The full-featured code editor makes editing code for the sign-in page, email templates, and error pages more efficient and less reliant on documentation. Developers can write, test, and publish code faster with syntax highlighting, autocomplete for variables, split versus unified diff views, and Revert, Preview, and Publish buttons. See Use the code editor.
Log Streaming is GA in Preview
Many organizations use third-party systems to monitor, aggregate, and act on the event data in Okta System Log events.
Log Streaming enables Okta admins to more easily and securely send System Log events to a specified systems, such as the Splunk Cloud or Amazon Eventbridge, in near real time with simple, pre-built connectors. Log streaming scales well even with high event volume, and unlike many existing System Log event collectors, it doesn't require a third-party system to store an Okta Admin API token. See Log Streaming API (opens new window).
Multibrand customizations are EA in Preview
Multibrand customizations allow customers to use one org to manage multiple brands and multiple custom domains. This drastically simplifies multi-tenant architectures where customers create multiple orgs to satisfy branding requirements. Multibrand customizations allow orgs to create up to three custom domains (more upon request), which can be mapped to multiple sign-in pages, multiple sets of emails, error pages, and multiple versions of the End-User Dashboard. See Brands.
OAuth 2.0 On-Behalf-Of Token Exchange is EA in Preview
OAuth 2.0 On-Behalf-Of Token Exchange helps retain the user context in requests to downstream services. It provides a protocol approach to support scenarios where a client can exchange an access token received from an upstream client with a new token by interacting with the authorization server. See Set up OAuth 2.0 On-Behalf-Of Token Exchange.
OIDC Identity Providers private/public key pair support is GA in Preview
Previously, Okta only supported the use of client secret as the client authentication method with an OpenID Connect-based Identity Provider. Okta now supports the use of private/public key pairs (private_key_jwt
) with OpenID Connect-based Identity Providers. Additionally, the Signed Request Object now also supports the use of private/public key pairs. See Create an Identity Provider in Okta.
Optional consent for OAuth 2.0 scopes is GA in Preview
OAuth 2.0 Optional Consent provides an optional property that enables a user to opt in or out of an app's requested OAuth scopes. When optional is set to true for a scope, the user can skip consent for that scope. See Request user consent.
Smart Card authenticator is Self-Service EA in Preview
You can add a new Smart Card authenticator that enables PIV to be used in authentication policies. You can also restrict the authentication policies to use only Smart Card authenticator as MFA. See properties.additionalAmr
in the updated Identity Provider attributes for X509
Smart Card support.
Splunk edition support for Log Streaming integrations is GA in Preview
The Splunk Cloud Log Streaming integration now supports GCP and GovCloud customers. You can set the Splunk edition parameter (settings.edition
) to AWS (aws
), GCP (gcp
), or AWS GovCloud (aws_govcloud
) in your Log Streaming integration. See Splunk Cloud Settings properties (opens new window).
Updated AWS EventBridge supported regions for Log Stream integrations
The list of supported AWS EventBridge regions has been updated based on configurable event sources. See the list of available AWS regions for Log Stream integrations (opens new window).
Developer documentation updates in 2023.02.0
The Okta Developer portal has a new look and feel. The home page (opens new window) features a curated set of resources on developer use cases for Workforce Identity Cloud solutions. You can also access the featured blog posts to stay up to date with implementing Okta features.
A new authorization guide is available to help admins and devs retain the user context in requests to downstream services. This document provides guidance on how a client can exchange an access token received from an upstream client with a new token by interacting with the authorization server. See Set up OAuth 2.0 On-Behalf-Of Token Exchange.
A new requirements guide is available for integration submissions to the Okta Integration Network (OIN). This document provides guidance for the artifacts required during the submission process, such as the logo, the customer configuration document, and the test account. See OIN submission requirements.
Bugs fixed in 2023.02.0
GET requests to the
/brands/{brandId}
endpoint didn't return the previously savedagreeToCustomPrivacyPolicy
. (OKTA-568074)GET requests to the
/brands/{brandId}/pages/sign-in/customized
endpoint returnednull
forwidgetCustomizations
. As a result, the updates weren't applied to the Okta Admin Console sign-in page. (OKTA-563838)The Add Group API (
/api/v1/groups
) created multiple groups of the same name if called within a short period of time (milliseconds). (OKTA-561481)The response took longer than necessary when an admin sent a request to delete an OpenID Connect app. (OKTA-531089)
The Roles API (
/iam/roles
) didn't support the self and next link relation types. (OKTA-512280)
January
Weekly release 2023.01.2
Change | Expected in Preview Orgs |
---|---|
Clock skew for access and ID tokens | February 1, 2023 |
Content Security Policy update | February 1, 2023 |
Interaction Code flow supports Native SSO | February 1, 2023 |
Bugs fixed in 2023.01.2 | February 1, 2023 |
Clock skew for access and ID tokens
A 30-second clock skew is now allowed for access and ID tokens to validate that a token was created before the current time.
Content Security Policy update
Over the next few months, we are gradually releasing enhancements to our Content Security Policy (CSP) (opens new window) headers. During this time you may notice an increase in header sizes.
Interaction Code flow supports Native SSO
The Interaction Code flow now supports the device_sso
scope, which you can use to perform Native SSO. This scope allows you to obtain an interaction code and exchange it for tokens and a device secret. See Implement authorization by grant type (opens new window).
Bugs fixed in 2023.01.2
Requests made with an empty Origin header returned an error response. (OKTA-449621)
Requests to assign a custom role to a user or group returned a generic Bad Request error when the required role or resource-set property was missing. (OKTA-538237)
Some custom admins didn't see groups and users that they had access to when they made a
GET
request to the Users (/users/{id}/groups
) and Groups (/groups/{id}/users
) APIs. (OKTA-568838)Users created using Just-In-Time provisioning weren't assigned to a group when a group rule existed. (OKTA-532840)
An unclear error message was returned when a group rules API call (
create
,update
, oractivate
) was made to assign users to read-only groups (for example,Everyone
). (OKTA-567972)
Weekly release 2023.01.1
Change | Expected in Preview Orgs |
---|---|
Bugs fixed in 2023.01.1 | January 19, 2023 |
Bugs fixed in 2023.01.1
Requests failed when an admin used a group limit in an expression that was more than 100 (for example,
getFilteredGroups(groupallowlist, group_expression, 101)
). (OKTA-565041)Requests failed when an admin used a group limit in an expression that was less than the number of groups that satisfied the request (for example,
Groups.startsWith("active_directory","eai_",10)
). (OKTA-556056)The
idp
property was missing in token inline hook requests. (OKTA-553322)A list security questions request (
/users/{userId}/factors/questions
) resulted in an unexpected security question and answer included in the response. (OKTA-567970)Users could request that one-time passwords for SMS, Voice, and Email activation be resent more times than allowed by the rate limit. (OKTA-550739)
Monthly release 2023.01.0
Change | Expected in Preview Orgs |
---|---|
Custom app login | January 11, 2023 |
Full regional support for AWS EventBridge Log Stream integrations is EA in Preview | January 11, 2023 |
Improvements to self-service account activities for AD and LDAP users | November 30, 2022 |
Improvements to the self-service registration experience | December 9, 2022 |
Optional consent for OAuth 2.0 scopes is EA in Preview | January 11, 2023 |
Revoke user sessions is GA in Production | December 9, 2022 |
Unusual telephony requests blocked by machine-learning measures | January 11, 2023 |
Bugs fixed in 2023.01.0 | January 11, 2023 |
Custom app login
Custom app login is now available to limited customers in Identity Engine. Only orgs that actively used this feature in Classic Engine before they upgraded may continue to do so. Orgs that don't use custom app login should continue to use the Okta-hosted sign-in experience or configure IdP routing rules (opens new window) that redirect users to the appropriate app to sign in.
Full regional support for AWS EventBridge Log Stream integrations is EA in Preview
The Log Streaming API has expanded support for all commercial regions in the AWS EventBridge Log Stream integration. See AWS EventBridge Setting property details (opens new window).
Improvements to self-service account activities for AD and LDAP users
Previously, the self-service unlock (SSU) and self-service password reset (SSPR) flows created unnecessary friction for AD and LDAP users. This feature enhancement introduces a seamless magic link experience in emails sent to unlock accounts and reset passwords. Users no longer need to provide consent when using the same browser. In addition, after successfully unlocking their account, clicking the email magic link counts towards the application's assurance policy. After the assurance requirements are met, the user is signed directly in to the application. These improvements are now GA in Preview. See Customize email notifications.
Improvements to the self-service registration experience
Earlier versions of the self-service registration (SSR) flow used a complicated array of templates to send activation emails to users. The simplified SSR flow reduces this to only two email templates with customized welcome messages. If your application requires immediate verification of the user's email address, use the Registration - Activation template. This template includes a magic link for a smoother sign-in experience. If email verification is not immediately required to sign in to the application, use the Registration - Email Verification template. This template includes a link for users to complete email verification at any time after they successfully sign in to the application. See Customize email notifications and the Okta email (magic link/OTP) integration guide.
Optional consent for OAuth 2.0 scopes is EA in Preview
OAuth 2.0 Optional Consent provides an optional property that enables a user to opt in or out of an app's requested OAuth scopes. When optional is set to true for a scope, the user can skip consent for that scope. See Request user consent.
Revoke user sessions is GA in Production
You can end all Okta sessions for a user when resetting their password. All sessions of the specified user are revoked except for the current session. This option protects the user account from unauthorized access. See the revokeSession
(opens new window) parameter in the User Credentials API.
Unusual telephony requests blocked by machine-learning measures
SMS and voice requests are now blocked if an internal machine-learning-based toll fraud and abuse-detection model considers the requests unusual. Telephony requests that are blocked by the machine-learning model have a DENY
status in the System Log.
Bugs fixed in 2023.01.0
The Log Streaming API returned the Splunk Cloud
token
property in the response body. (OKTA-437264)When an org had the Custom OTP, RSA SecurID, and YubiKey authenticators enabled and the
enroll_amr_values
parameter value wasotp
, users were prompted to enroll in all three authenticators rather than just Custom OTP. (OKTA-545674)