On this page

Okta Classic Engine API release notes (2025)

January

Weekly release 2025.01.2

Change Expected in Preview Orgs
Authentication claims sharing between Okta orgs is EA in Preview January 29, 2025
Bugs fixed in 2025.01.2 January 29, 2025

Authentication claims sharing between Okta orgs is EA in Preview

Authentication claims sharing allows an admin to configure their Okta org to trust claims from IdPs during SSO. Sharing claims also allows Okta to interpret the authentication context from an IdP. This helps eliminate duplicate factor challenges during user authentication and helps improve security posture. See Configure claims sharing.

Bugs fixed in 2025.01.2

  • When the Default Network Zone IP Exempt List feature was enabled for an org, an admin was able to delete the default example IP zone using the Zones API (/api/v1/zones/{DefaultExemptIpZone ID}). (OKTA-817263)
  • The List all principal rate limits (opens new window) returned an empty response when querying with a custom client_id and using OAuth 2.0 for authentication. (OKTA-832687)
  • When a super admin updated a deactivated user to a different realm, admins received a Resource not found error. (OKTA-699778)
  • Events for tokens revoked in bulk for a resource didn't appear in the System Log. (OKTA-834025)
  • The okta.accessRequests.catalog.read scope was missing from the Okta Identity Governance APIs. (OKTA-846162)

Weekly release 2025.01.1

Change Expected in Preview Orgs
Bug fixed in 2025.01.1 January 15, 2025

Bug fixed in 2025.01.1

When an admin attempted to delete an IdP using the SDK, the operation failed with an HTTP 500 response code. (OKTA-846005)

Monthly release 2025.01.0

Change Expected in Preview Orgs
Additional use case selection in the OIN Wizard January 8, 2025
Deprecated API endpoints: Extend, Grant, and Revoke Okta Support access January 8, 2025
Granular configuration for Keep Me Signed In is EA in Preview January 8, 2025
POST requests to the authorize endpoint is self-service EA January 8, 2025
Selected Okta Identity Governance APIs are now GA January 8, 2025

Additional use case selection in the OIN Wizard

Independent software vendors (ISVs) can select the following additional use case categories when they submit their integration to the OIN:

  • Automation
  • Centralized Logging
  • Directory and HR Sync
  • Multifactor Authentication (MFA)

See OIN Wizard use case selection.

Deprecated API endpoints: Extend, Grant, and Revoke Okta Support access

The following API endpoints have been deprecated:

Use the Update an Okta Support case (opens new window) endpoint to extend, grant, or revoke Okta Support access for a specific support case. For the corresponding Okta Admin Console feature, see Give access to Okta Support (opens new window).

Granular configuration for Keep Me Signed In is EA in Preview

Admins can now configure the post-authentication prompt for Keep Me Signed In (KMSI) at a granular level in authentication policies. This allows admins to selectively enable post-authentication KMSI on a per-user, per-group, or per-app basis. When enabled, this feature exposes a frequency setting that lets admins control how often the post-authentication prompt is presented to users. See Configure Keep me signed in (KMSI).

The post-authentication prompt text (title, subtitle, accept button, and reject button) is now customizable through the Brands API. See Customize post-authentication sign-in prompts.

POST requests to the authorize endpoint is Self-Service EA

You can now send user data securely in a POST request body to the /authorize endpoint.

Selected Okta Identity Governance APIs are now GA

The following Okta Identity Governance APIs are GA:

The following Access Requests - V2 administrative APIs are now EA:

For further information, see Identity Governance (opens new window) and Okta Identity Governance API (opens new window).