All Developer Edition Orgs will be deactivated starting on July 18, 2025. Sign up for the new Integrator Free Plan to continue building and integrating. Learn more on the Okta Developer Blog

On this page

Okta Privileged Access API release notes (2025)

Okta Privileged Access (OPA) is available for both Okta Classic and Identity Engine.

August

Weekly release 2025.08.2

Change Expected in Preview
Active Directory Remote Desktop Protocol (RDP) support is EA August 20, 2025

Active Directory Remote Desktop Protocol (RDP) support is EA

Security admins can grant users RDP access to Windows servers with Active Directory (AD) credentials. After RDP access is granted, end users can connect to Windows servers through RDP using the SFT client. Security admins can set requirements, such as multifactor authentication, approval requests, or resource checkout, in order for users to connect through RDP. Currently, gateways aren't supported for RDP connections with AD credentials.

You can grant RDP permission to AD users on Windows servers through the security policy. See privileges (opens new window) in the Security Policy API. See user access method details in the List all user access methods for an Active Directory account (opens new window) method and in Server Resolve resource names (opens new window). For product documentation, see Add rules to a policy (opens new window).

Monthly release 2025.08.0

Active Directory rotate password configuration is EA

Resource admins can now disable the initial password rotation for discovered Active Directory (AD) accounts. Previously, all new or updated AD accounts discovered were automatically initiated for password rotation. Security admins can now set up security policies with rotate-password privileges. End users under that security policy can rotate accessible AD accounts regardless of whether the password was initially rotated. This feature provides the flexibility for OPA admins and end users to manage password rotation.

Service Accounts API is EA

The new Service Accounts API (opens new window) is now available for Okta Privileged Access-enabled orgs. This API allows you to manage SaaS or On-Prem Provisioning (OPP) app accounts. App accounts that you create through the Service Accounts API are visible to resource admins in the Okta Privileged Access dashboard. See Manage service accounts (opens new window) in the Okta Privileged Access product documentation.

This feature is available only if you're subscribed to Okta Privileged Access. Ensure that you've set up the Okta Privileged Access app before creating app accounts through the API.

Search capability for Okta Privileged Access secrets

Okta Privileged Access users can now search secrets and their folders. A new search query parameter is available for the List top-level secret folder for a user (opens new window) operation. End users can search for secrets or secret folders that they have access to by the secret name or description that contains a substring.

June

Monthly release 2025.06.0

Updates to password rotation frequency

You can now schedule the password rotation frequency for all projects up to a maximum of 400 days. The periodic_rotation_duration_in_seconds parameter now has a maximum value of 34,560,000 seconds in the following operations:

May

Weekly release 2025.05.3

OPA Active Directory API resources are EA

You can now manage Okta Privileged Access (OPA) Active Directory (AD) integrations through the API. To enable this Early Access feature, contact Okta Support. See the Manage Active Directory accounts (opens new window) product documentation. The following OPA AD API resources are available:

Cloud Infrastructure Entitlements API is deprecated

The Cloud infrastructure entitlements feature is no longer supported in Okta Privileged Access. All resources in the Cloud Infrastructure Entitlements API are now deprecated.