On this page

Identity Engine

Okta Identity Engine API release notes (2025)

January

Weekly release 2025.01.2

Change Expected in Preview Orgs
Authentication claims sharing between Okta orgs is EA in Preview January 29, 2025
Bugs fixed in 2025.01.2 January 29, 2025

Authentication claims sharing between Okta orgs is EA in Preview

Authentication claims sharing allows an admin to configure their Okta org to trust claims from IdPs during SSO. Sharing claims also allows Okta to interpret the authentication context from an IdP. This helps eliminate duplicate factor challenges during user authentication and helps improve security posture. See Configure claims sharing.

Bugs fixed in 2025.01.2

  • When the Default Network Zone IP Exempt List feature was enabled for an org, an admin was able to delete the default example IP zone using the Zones API (/api/v1/zones/{DefaultExemptIpZone ID}). (OKTA-817263)
  • The List all principal rate limits (opens new window) returned an empty response when querying with a custom client_id and using OAuth 2.0 for authentication. (OKTA-832687)
  • When a super admin updated a deactivated user to a different realm, admins received a Resource not found error. (OKTA-699778)
  • Events for tokens revoked in bulk for a resource didn't appear in the System Log. (OKTA-834025)
  • Refresh tokens for OpenID Connect apps that have Single Logout enabled with user session details were getting invalidated before their max lifetime. (OKTA-730794)
  • Account unlock didn't work for some orgs using the Okta account management policy. (OKTA-848066)
  • The okta.accessRequests.catalog.read scope was missing from the Okta Identity Governance APIs. (OKTA-846162)

Weekly release 2025.01.1

Change Expected in Preview Orgs
Bugs fixed in 2025.01.1 January 15, 2025

Bugs fixed in 2025.01.1

  • When an admin attempted to delete an IdP using the SDK, the operation failed with an HTTP 500 response code. (OKTA-846005)

  • POST requests with an OAuth token to the /devices/{deviceId}/lifecycle/deactivate endpoint by an API service app using the Client Credentials flow returned 403 error responses. The deactivations succeeded in spite of the error response. (OKTA-838539)

Monthly release 2025.01.0

Change Expected in Preview Orgs
Additional use case selection in the OIN Wizard January 8, 2025
Configure Identity Verification with third-party Identity Verification providers is GA Production October 2, 2024
Deprecated API endpoints: Extend, Grant, and Revoke Okta Support access January 8, 2025
Granular configuration for Keep Me Signed In is EA in Preview January 8, 2025
Multiple Identifiers is GA in Preview November 7, 2024
New group.source.id key for group functions in Expression Language January 2, 2025
POST requests to the authorize endpoint is self-service EA January 8, 2025
Selected Okta Identity Governance APIs are now GA January 8, 2025
Bug fixed in 2025.01.0 January 8, 2025

Additional use case selection in the OIN Wizard

Independent software vendors (ISVs) can select the following additional use case categories when they submit their integration to the OIN:

  • Automation
  • Centralized Logging
  • Directory and HR Sync
  • Multifactor Authentication (MFA)

See OIN Wizard use case selection.

Configure Identity Verification with third-party Identity Verification providers is GA Production

You can now configure third-party Identity Verification providers using the IdP API and Okta account management policy rules. Okta supports Persona as a third-party Identity Verification provider.

Identity Verification enables you to use a third-party Identity Verification provider to verify the identity of your users. Verification requirements and the Identity Verification provider are based on your authentication policies and configurations within your Okta org. To configure an Identity Verification provider in the Admin Console, see Add an Identity Verification vendor as Identity Provider (opens new window).

Deprecated API endpoints: Extend, Grant, and Revoke Okta Support access

The following API endpoints have been deprecated:

Use the Update an Okta Support case (opens new window) endpoint to extend, grant, or revoke Okta Support access for a specific support case. For the corresponding Okta Admin Console feature, see Give access to Okta Support (opens new window).

Granular configuration for Keep Me Signed In is EA in Preview

Admins can now configure the post-authentication prompt for Keep Me Signed In (KMSI) at a granular level in authentication policies. This allows admins to selectively enable post-authentication KMSI on a per-user, per-group, or per-app basis. When enabled, this feature exposes a frequency setting that lets admins control how often the post-authentication prompt is presented to users. See Configure Keep me signed in (KMSI).

The post-authentication prompt text (title, subtitle, accept button, and reject button) is now customizable through the Brands API. See Customize post-authentication sign-in prompts.

Multiple Identifiers is GA in Preview

Today, end users must sign in to Okta with a username or email address only. With the Multiple Identifiers feature, admins can configure identifiers, or user attributes from Universal Directory, that an end user can enter to authenticate. Multiplier identifiers work in sign-in, recovery, self-service registration, and unlock flows. Admins can configure up to three identifiers, including email (which is still a required identifier). See Configure multiple identifiers.

New group.source.id key for group functions in Expression Language

You can now use the group.source.id key in Expression Language group functions to filter between groups that have the same name. See Group functions.

POST requests to the authorize endpoint is Self-Service EA

You can now send user data securely in a POST request body to the /authorize endpoint.

Selected Okta Identity Governance APIs are now GA

The following Okta Identity Governance APIs are GA:

The following Access Requests - V2 administrative APIs are now EA:

For further information, see Identity Governance (opens new window) and Okta Identity Governance API (opens new window).

Developer documentation updates in 2025.01.0

The Sign users in to your SPA using redirect guides for the Angular and React platforms are now revised to use updated versions of Okta SDKs, framework dependencies, and coding patterns.

Bug fixed in 2025.01.0

Requests to the /policies/{policyId}/rules and /policies/{policyId}/rules/{ruleId} endpoints to create or update Okta account management policy rules included default Keep me signed in (KMSI) settings in the responses. (OKTA-848236)