On this page

Okta Classic Engine API release notes (2026)

RSS Subscribe to RSS

March

Monthly release 2026.03.0

Change Expected in Preview Orgs
Self-Service for Enhanced Disaster Recovery is self-service EA in Preview March 4, 2026
Submit API service integrations March 4, 2026
Admin Console Home page March 4, 2026
New Directories Integration endpoints to view extended Active Directory group attributes is GA in Preview March 4, 2026
Enable custom admin permissions for inline and event hooks is GA in Preview December 10, 2025
Developer documentation updates in 2026.03.0 March 4, 2026
Bug fixed in 2026.03.0 March 4, 2026

Self-Service for Enhanced Disaster Recovery is self-service EA in Preview

When unexpected infrastructure-related outages occur, orgs need an immediate and reliable way to maintain business continuity. Okta's Standard Disaster Recovery, implemented by Okta's operations teams, provides failover and failback with a recovery time objective of one hour.

Okta's Enhanced Disaster Recovery (Enhanced DR) gives admins the option to manage their org's recovery. This feature empowers admins by providing direct, self-service tools and APIs to manage, test, and automate the failover and restoration processes for their impacted orgs.

With Enhanced DR, admins gain active control to initiate a failover and restore for impacted orgs directly from the Okta Disaster Recovery Admin portal or through APIs. Additionally, teams can validate their system's resilience by safely testing these failover and restoration capabilities at their convenience. Finally, Enhanced DR enables orgs to automate failover processes by using real-time monitoring to invoke failover APIs, significantly minimizing downtime during an actual event. See Manage org recovery with Okta Enhanced Disaster Recovery.

Submit API service integrations

Independent Software Vendors (ISVs) can now use the OIN Wizard to submit API service integrations to the Okta Integration Network (OIN). Previously, ISVs provided metadata in the OIN Manager. With this update, ISVs can create and configure API service apps directly within the OIN Wizard The OIN Wizard currently supports only client secret authentication for API service integrations. ISVs can also generate credentials and perform end-to-end testing independently. These improvements streamline the app submission process and ensure a faster, more secure review. See Submit an integration with the OIN Wizard.

Admin Console Home page

The new Admin Console Home page for IFT orgs provides a faster way to start and manage your app submissions. Instead of navigating through the previous Applications > Your OIN Integrations path, you can now initiate submissions directly from the Home page. This guided experience helps you select integration types, understand requirements through a new Quick Start guide, and track your submission in real time from build to publication. It also includes a Coming Soon section to preview and register for upcoming integrations, making the entire process more centralized and efficient.

New Directories Integration endpoints to view extended Active Directory group attributes is GA in Preview

New API endpoints have been added to the Directories Integration (POST /api/v1/directories/{appInstanceId}/group/{groupId}/query and GET /api/v1/directories/{appInstanceId}/group/{groupId}/query/{resultId}), which allows for the real-time retrieval of any standard or custom attribute from Active Directory (AD) groups. You can now programmatically access attributes, like cost centers and department codes, without waiting for a full directory sync. This feature allows you to accelerate automation by using live AD group metadata, while simultaneously eliminating manual data management by creating a single, reliable bridge between your on-premises directory details and your cloud ecosystem. See Directories Integrations API (opens new window).

Enable custom admin permissions for inline and event hooks is GA in preview

The inline hook and event hook framework now supports read and write permissions for custom admin roles. This enhancement gives fine-grained access to manage inline and event hooks that previously required the super admin role. See Hooks admin roles.

Developer documentation updates in 2026.03.0

  • Okta's API reference pages (opens new window) are undergoing a migration, which started on February 24. While the look and feel may vary across pages during this time, all technical documentation remains accurate and up to date.

  • You can no longer submit API service integrations through the OIN Manager, so the instructions have been removed from the OIN Manager guide. To submit an API service integration, use the OIN Wizard.

  • A new guide is available for Okta Enhanced Disaster Recovery, a feature that gives admins direct control over business continuity. Learn how to:

    • Initiate failover and restoration (failback) using the self-service portal or APIs.
    • Validate system resilience by safely testing recovery capabilities.
    • Automate failover processes to minimize downtime during an outage.

    See Manage org recovery with Okta Enhanced Disaster Recovery.

Bug fixed in 2026.03.0

In some orgs, password reset emails didn't allow users to reset their password. (OKTA-1120290)

February

Weekly release 2026.02.2

Change Expected in Preview Orgs
Bug fixed in 2026.02.2 February 19, 2026

Bug fixed in 2026.02.2

Invalid device enrollments sometimes caused the Firebase Cloud Messaging (FCM) push notification service to stop for all users. (OKTA-1013806)

Monthly release 2026.02.0

Change Expected in Preview Orgs
Lightweight Directory Access Protocol Bidirectional Group Management is GA in Production December 5, 2025
Developer documentation updates in 2026.02.0 February 4, 2026
Bugs fixed in 2026.02.0

Lightweight Directory Access Protocol Bidirectional Group Management

The Bidirectional Group Management API (opens new window) has been expanded to allow you to manage Lightweight Directory Access Protocol (LDAP) groups from within Okta. You can add or remove users from groups based on their identity and access requirements. This ensures that changes made to user access in Okta are reflected in LDAP.

Okta can only manage group memberships for users and groups imported into Okta using the LDAP or Active Directory (AD) integration. It isn't possible to manage users and groups that weren't imported through LDAP or AD integration or are outside the organizational unit's scope for the integration using this feature.

Developer documentation updates in 2026.02.0

  • All references to deprecated API Postman collections are now removed from Home | Okta Developer (opens new window) and replaced with references to the Okta Public API Collections (opens new window) workspace.
  • The new Universal Directory concept provides a comprehensive overview of Okta’s Universal Directory (UD). UD is the centralized data layer that serves as the foundation for the entire Okta platform. This new doc replaces the previous User Profiles concept and goes into more depth on its components and advantages.
  • The Okta developer portal search results now include the API references.

Bugs fixed in 2026.02.0

  • When users requested metadata for a non-existent identity provider, the system attempted to trigger an undefined error code. This caused a secondary exception in the Splunk logs. (OKTA-504955)
  • When no-cache, no-store headers from /oauth2/<authorizationServerId>/v1/keys were returned, it caused an unnecessarily high number of requests to /oauth2/<authorizationServerId>/v1/keys. (OKTA-1099636)
  • Scopes that were skipped during granular consent were still included in the access token after grants were created. (OKTA-1045702)

January

Weekly release 2026.01.2

Change Expected in Preview Orgs
Bug fixed in 2026.01.2 January 28, 2026

Bug fixed in 2026.01.2

When you call the List all Groups API (/api/v1/groups (opens new window)) with the expand=stats query parameter, the response returned inaccurate data for the _embedded.stats.hasAdminPrivileges field for groups with assigned custom roles. (OKTA-1094903)

Weekly release 2026.01.1

Change Expected in Preview Orgs
Bugs fixed in 2026.01.1 January 14, 2026

Bugs fixed in 2026.01.1

  • The agentType parameter wasn't required in the POST /api/v1/agentPools endpoint and an exception didn't occur if that parameter was missing. (OKTA-1071106)

  • After provisioning a group from Active Directory or reactivating a user in an Okta group (Reactivate a user API (opens new window)), Okta assigned an admin role to the user through group rules but didn't create a System Log event for the assignment. (OKTA-1071233)

Monthly release 2026.01.0

Change Expected in Preview Orgs
Encryption of ID tokens and access tokens is GA in Production August 7, 2025
Unified claims generation for custom apps is GA in Production July 30, 2025
Additional Anything-as-a-Source API endpoints is GA in Production December 10, 2025
Anything-as-a-Source for groups and group memberships API is GA in Production December 10, 2025
Developer documentation updates in 2026.01.0 January 7, 2026
Bugs fixed in 2026.01.0 January 8, 2025

Encryption of ID tokens and access tokens is GA in Production

You can now encrypt OIDC ID tokens for Okta-protected custom app integrations using JSON Web Encryption. You can also now encrypt access tokens minted by a custom authorization server. See Key management.

Unified claims generation for custom apps is GA in Production

Unified claims generation is a new streamlined interface for managing claims (OIDC) and attribute statements (SAML) for Okta-protected custom app integrations. In addition to group and user profile claims, the following new claim types are available: entitlements (required OIG), device.profile, session.id, and session.amr. See Okta Expression Language in Identity Engine.

Additional Anything-as-a-Source API endpoints is GA in Production

Anything-as-a-Source (XaaS) capabilities allow customers to use a custom identity source with Okta. With XaaS, customers can source entities such as users into Okta Universal Directory by connecting a custom HR app or a custom database. This release offers Anything-as-a-Source APIs for both individual operations and bulk operations on groups, group memberships, and users. Okta now enables creating and updating users, creating and updating groups, and managing group memberships into Okta Universal Directory from any identity source using the Identity Source APIs. See Identity Sources (opens new window).

Anything-as-a-Source for groups and group memberships API is GA in Production

Anything-as-a-Source (XaaS) capabilities allow customers to use a custom identity source with Okta. With XaaS, customers can source entities such as users into Okta Universal Directory by connecting a custom HR app or a custom database. This release offers XaaS capabilities with groups and group memberships, allowing customers to start sourcing groups with XaaS. Okta now enables creating and updating users, creating and updating groups, and managing group memberships into Okta Universal Directory from any identity source using the Identity Source APIs. See Identity Sources (opens new window).

Developer documentation updates in 2026.01.0

Bugs fixed in 2026.01.0

  • The following attributes weren't properly being gated as reserved attributes: orgid, activationstatus, apistatus, logintype, initialreconcilecomplete, activationdate, statuschangeddate, apilastupdate, passwordexpirationguess, passwordexpirationcursor, numunlocks, changedstatus. See Review reserved attributes (opens new window). (OKTA-1049339)

  • An error sometimes occurred when an admin attempted to update the username for an app user. (OKTA-1047716)