Okta Identity Governance release notes (Archive)

Release 2024.04.0

Features and enhancements

Govern Okta admin roles

As a super admin, you can use this feature to adopt a zero standing privilege model for your org by allowing users to request time-bound access to Okta admin roles directly from their End-User Dashboard and periodically reviewing their admin access.

The feature helps you streamline processes around requesting, approving, and certifying access to admin roles and allows you to control the level of access and its duration to your org's critical resources. In addition, you can audit users' existing admin role assignments using Access Certifications campaigns and specify reviewers who should approve or revoke users' access.

See Govern Okta admin roles.

Govern Okta admin roles might not be available for you depending on your org's eligibility. Contact your account executive or customer success manager.

Export steps

Super admins and access request admins can now export list of steps and the requests they’re associated with. A step is any item that you can add to a request type, such as questions, tasks (approval, action, or custom), and timer setting. See Export data from Access Requests.

Sync entitlements

You can now manually sync entitlements to Okta for provisioning-enabled apps to refresh a user's entitlements. See Sync entitlements from provisioning-enabled apps.

Release 2024.03.2

Features and enhancements

Submit requests for another user

Users can now request access to a resource on behalf of another user from the Access Requests web app if both, the request creator and the person they’re creating the request for, are in the Request Type’s audience. Request approvers and assignees also have visibility if a user made a request on behalf of another user. See Create requests.

Fixes

  • Admins couldn't change the end date of a campaign if it was the last one in a recurring campaign series. (OKTA-709708)

Release 2024.03.0

Features and enhancements

Removed request list filters

The following filters are no longer supported on the All Requests page of the Okta Access Requests web app and console:

  • Task assignee
  • Task status
  • Field assignee
  • Field value

All existing lists that use these filters will be deleted.

Fixes

  • Some review items weren't listed in closed Access Certifications campaigns or in the Campaign Details report. (OKTA-701322)

  • Apps weren't unassigned upon user account deactivation. (OKTA-666296)

  • User campaigns included groups assigned by group rules in the review even if the campaign creator selected the Only include individually assigned groups checkbox. (OKTA-682664)

Release 2024.02.1

Fixes

  • Sometimes the Okta Expression Language in the User Scope field cleared when admins edited it. (OKTA-694122)

Release 2024.02.0

Features and enhancements

Govern Okta admin roles with Access Certifications

Super admins can use this feature to review users' admin role assignments using Access Certifications campaigns. Prevent accumulation of elevated levels of access and improve the security of your org with this feature. See Campaigns.

Govern Okta admin roles with Access Certifications is an Early Access feature. See Enable self-service features.

New options to define user scope

When creating or editing a rule for entitlement policy, you now have two ways of defining user scope. The Use basic conditions option helps you define user scope without using Okta Expression Language. The Use Okta Expression Language (advanced) option helps you define a more customized user scope with Okta Expression Language. See Create an entitlement policy.

Invalidate user sessions

The Access Requests console now invalidates a user's session if the user's session is used from a different IP address than the IP address it was created from. Contact Support if you want to opt out of IP session binding enforcement within Access Requests.

Updated list of unsupported first-party apps

The list of first-party apps that can't be requested using Access Requests now includes the following:

  • OktaAccess Certifications Reviews

  • OktaEntitlement Management

  • OktaAccess Requests Admin

  • Okta Privileged Access

  • Okta Account Service SSO

Release 2024.01.2

Fixes

  • The Campaign Summary report incorrectly listed some campaign reviews twice. (OKTA-682639)

  • Recurring campaigns weren't listed in the Past Campaign Summary and Past Campaign Details reports if you modified their end dates. (OKTA-686465)

Release 2024.01.0

Features and enhancements

Team privacy default setting

When you create teams, the Request Privacy option is now on by default. See Create an Access Requests team.

Entitlement Management

Entitlement Management offers you a simple and powerful way to ensure that users in an org have the right permissions for each resource. With Entitlement Management, you can create, store, and manage your application entitlements in Okta. Assign entitlements using a policy or individually from the Admin Console.

The feature is integrated with Access Requests and Access Certifications to help you manage and monitor users' access to resources. You can also manage their level of access within these resources and how the access was granted from the Admin Console. Use Entitlement Management to help meet your audit and compliance requirements for professional standards like SOC2, SOX, and others. See Entitlement Management.

Release: 2023.12.2

Fixes

Access Certifications
  • Apps weren't unassigned from a user when their account was deactivated. (OKTA-666296)

  • When reviewing a campaign, the Application last accessed date in the Review details panel didn't match the Last Login Date in the Current Assignments report. (OKTA-670107)

Release: 2023.12.0

Features and enhancements

Entitlement Management
  • Entitlement Management

    Entitlement Management offers you a simple and powerful way to ensure that users in an org have the right permissions for each resource. With Entitlement Management, you can create, store, and manage your application entitlements in Okta. Assign entitlements using a policy or individually from the Admin Console.

    The feature is integrated with Access Requests and Access Certifications to help you manage and monitor users' access to resources. You can also manage their level of access within these resources and how the access was granted from the Admin Console. Use Entitlement Management to help meet your audit and compliance requirements for professional standards like SOC2, SOX, and others. See Entitlement Management.

Release: 2023.11.1

Features and enhancements

Access Requests
  • Teams setting removed

    On the Access Requests Teams page, the Invite Only setting is removed. Previously, users could change the setting to False. Now Access Requests teams are always invite-only.

Release: 2023.11.0

Features and enhancements

Access Certifications

Release: 2023.10.2

Fixes

Access Certifications
  • Admins couldn't preview reviewers if the first-level reviewer was set as Manager for User campaigns with user scope defined as Individual users and resource scope defined as All Apps. (OKTA-656407)

Release: 2023.10.1

Fixes

Access Requests
  • Request assignees couldn't run a delegated flow manually if any information was missing from the task. See Manage tasks.

Release: 2023.10.0

Features and enhancements

Access Certifications
  • Campaign violation warnings

    A warning message now appears instead of a campaign launch failure when an admin launches a campaign that includes invalid or missing resources.

  • Admin experience enhancements

    Campaigns now end when all reviewers in the campaign complete their reviews. See Campaigns.

    The following options now are available when creating or modifying a campaign:

    • Users: Only include active Okta users in this campaign: This option is only available for resource campaigns that include groups as resources. See User settings

    • Reviewers:

      1. Require justification: This option makes it mandatory for reviewers to enter a justification for their decision to approve or revoke a user’s access to a resource.

      2. Disable bulk edit: This option prevents reviewers from selecting multiple reviews to approve or revoke. Reviewers can still reassign multiple reviews to another user.

    See Reviewer settings.

Fixes

Access Certifications
  • When an admin used the Okta Expression Language to scope users to the dateValue profile attribute on a campaign, an warning appeared if the attribute was set to less than or equal to three days from the current date. (OKTA-645299)

Release: 2023.09.0

Features and enhancements

Access Requests
  • Changes to the request UI

    The UI for requests in the Access Requests web app has been updated to improve the user experience for approvers and request assignees:

    • Request details such as the request type, team, assignee, and tags are now located on the center panel instead of the right panel.

    • Actions and Activity tabs have been added to the center panel.

      • The Actions tab contains Tasks and Questions sections. See Manage tasks.

      • The Activity tab contains a log of changes or events for the request.

    • The chat has been decoupled from Activity and is now located on the right panel.

  • Sync Okta groups and apps automatically

    Now applications and groups on the Resources tab sync automatically with Okta. You don't need to click Update now before using the app or group that you recently created in Okta.

Release: 2023.08.2

Fixes

Access Certifications
  • When editing a scheduled resource campaign, admins received an error and couldn't save their changes if a resource included in the campaign was deleted from Okta. (OKTA-637849)

Release: 2023.08.0

Features and enhancements

Access Certifications
  • Disable self-review

    Admins now have the ability to disable self-review for campaigns while defining campaign reviewers. This option provides you the flexibility to allow or disallow self-reviews for each campaign. See Campaign settings.

  • User campaigns are now available in Production environments

    User campaigns provide you with a comprehensive view of users’ access to resources. They help you tackle elevated access challenges that arise when users’ relationship with the organization changes due to events such as role, department, or project change. You can configure these campaigns to only include individually assigned resources, thereby reducing the need for reviewers to review group-assigned resources governed by group membership and rules. See Campaigns.

Access Requests
  • Past Access Requests report improvements

    The Past Access Requests report now displays requests that were approved automatically. In addition, you can also filter the report using Auto approved as a value for the Decision filter.

  • Contextual information for requests

    The contextual data for actions is now available to Access requests administrators and to all members of the team that owns the request type but is unavailable to requesters. In addition, the link to Okta Workflows console is included as contextual data for the Run a workflow action.

Fixes

Access Certifications
  • The Past Campaign Details report didn't always display the reviewer's name. (OKTA-630255)

Access Requests
  • Approvers didn't receive Slack notifications when they or a request assignee completed a task assigned to them.

Release: 2023.07.2

Fixes

Access Certifications
  • The Past Campaign Details report didn't always display the reviewer's name. (OKTA-630255)

Access Requests
  • Approvers didn't receive Slack notifications when they or a request assignee completed a task assigned to them.

Release: 2023.07.1

Fixes

Access Certifications
  • Scheduled campaigns failed to launch if the reviewer type was User's manager and a user's manager was deleted from Okta. (OKTA-628087)

  • While previewing users, admins received an incorrect error message if the Okta Expression Language expression couldn't find the referenced object. (OKTA-628105)

  • Admins couldn't view a campaign's details if they specified a group that should be excluded from the User campaign and then deleted the group in Okta. (OKTA-629574)

Release: 2023.07.0

Features and enhancements

Access Certifications
  • Review details panel enhancement

    When reviewing items, the group description is now visible to reviewers (if one exists for the group). This helps reviewers make an informed decision to approve or deny user's access to the group.

  • User campaigns is now available in Preview environments

    User campaigns provide you with a comprehensive view of users’ access to resources. They help you tackle elevated access challenges that arise when users’ relationship with the organization changes due to events such as role, department, or project change. You can configure these campaigns to only include individually assigned resources, thereby reducing the need for reviewers to review group-assigned resources governed by group membership and rules. See Campaigns.

Access Requests
  • Okta Workflows actions for Access Requests

    Adding a Run a workflow action task in a Request Type allows requests to run a delegated flow automatically. This feature lets you use your existing Workflows connectors and flows in Access Requests to further automate requests. See Before you begin.

  • Removed ability to change the requester

    Admins and request assignees can no longer change the requester after the request is submitted. They can either reject the tasks for the request or ask the requester to cancel the request.

Release: 2023.06.2

Features and enhancements

Access Requests
  • Just-in-time assignments

    When Request Types have conditional logic for tasks and questions, users are now assigned tasks and questions only after the prerequisite dependencies are fulfilled. This reduces confusion for users because they’re only assigned tasks or questions that they can take action on.

Fixes

Access Certifications
  • When reassigning review items, reviewers were unable to search for the new reviewer using their first and last name. (OKTA-443831)

  • The resource's assignment date was checked at the time of remediation, which slowed the remediation process. (OKTA-582449)

  • You could only have either a user or a group as the Group owner reviewer type. (OKTA-587264)

Access Requests
  • Admins and team members could view and click the Edit draft button for Requests Types that they didn’t own.

Release: 2023.06.1

Features and enhancements

Access Requests
  • New operator for Request Type

    The includes operator provides more flexibility in the conditional logic that references a Dropdown input type. This is useful when configuring Request Types that reference multiple resources.

  • Cancel requests

    Requesters now have the flexibility to cancel a request if a team member or approver hasn't taken any action on it. They can only cancel the request from the Access Requests web app. Access Requests cancels a request if the user's access to the Access Requests web app is revoked or their status in Okta changes to suspended or deactivated. This feature improves productivity for team members and approver by reducing the incorrect requests that they need to manage.

  • New System Log event for canceled requests

    The System Log now records an access.request.cancel event when a request is canceled.

Fixes

Identity Governance
  • Okta Workflows failed to invoke some Access Certifications and Access Requests API endpoints. (OKTA-618561)

Release: 2023.06.0

Features and enhancements

Access Certifications
  • Multilevel Reviews is now available in Production environments

    Use this feature to set up two levels of approval within a single campaign. You can select which review items go to the second level. You can also view the information for closed multilevel review campaigns from the Past Campaign Details and Past Campaign Summary reports.

    This feature allows you to collect decisions from different sets of relevant stakeholders to ensure accurate decisions are made for your users’ access to resources. See Create campaigns.

  • API support for features

    Recurring campaigns, Additional reviewer type options, Multilevel reviews, and User campaigns features are now supported by APIs.

Access Requests
  • Supported file types

    You can now upload and download all file types in the Access Requests web app chat. When you download a file from the chat, the original name and file type are retained.

Fixes

Access Requests
  • The new name of the team was reflected only after you refreshed the team's page.

  • The conditional logic for new approval tasks defaulted to is completed instead of is approved.

Release: 2023.05.3

Features and enhancements

Access Certifications
  • User campaigns

    User campaigns provide you with a comprehensive review of users’ access to resources. They help you tackle elevated access challenges that arise when users’ relationship with the organization changes due to events such as, role, department, or project change. You can configure these campaigns to only include individually assigned resources, thereby reducing the need for reviewers to review group-assigned resources governed by group membership and rules. See Campaigns.

    Note: User campaigns is an Early Access feature. To learn how to enable it, see Enable self-service features.

Fixes

Access Certifications
  • Campaigns on the Active, Scheduled, and Closed tabs weren't sorted in the default order of the most recent campaign first. (OKTA-607347)

  • The Past Campaign Details report didn't display the reviewer name. (OKTA-613193)

  • Reviewers were unable to take any action on their pending review items if the user who created the campaign was deleted from Okta. (OKTA-613929)

Access Requests
  • Approvers didn't receive email notifications about their open tasks if they weren't a team member or request assignee, if they'd previously viewed the request, or if the request had interdependent tasks. (OKTA-608756)

  • When users requested access, the response dropdown menus associated with questions didn’t render properly in the Access Requests web app. (OKTA-613362)

Release: 2023.05.1

Fixes

Access Certifications
  • Some campaign pages were rendered blank if you edited a campaign after deleting or deactivating a critical resource, such as an excluded user or a reviewer group. (OKTA-594828 and OKTA-604498)

  • Reviewers didn't receive email notifications if a campaign with a high volume of reviewer items had Groups as the reviewer type. (OKTA-608517)

Access Requests
  • When filing a request in the Access Requests console, users couldn't view some Request Type questions.

Release: 2023.05.0

Features and enhancements

Access Certifications
  • Multilevel Reviews is now available in Preview environments

    Use this feature to set up two levels of approval within a single campaign. You can select which review items go to the second level. You can also view the information for closed multilevel review campaigns from the Past Campaign Details and Past Campaign Summary reports.

    This feature allows you to collect decisions from different sets of relevant stakeholders to ensure accurate decisions are made for your users’ access to resources. See Create campaigns.

Fixes

Access Certifications
  • Reviewers received some email notifications with incorrect campaign due date timestamps. (OKTA-602462)

Release: 2023.04.3

Fixes

Access Requests
  • Some users didn't receive email notifications for pending approval requests. (OKTA-604594)

Release: 2023.04.2

Fixes

Access Requests
  • When a Request Type with multiple tasks was used for submitting requests, users received multiple duplicate messages and errors. (OKTA-591260)

  • Access request admins who had a custom user type were unable to perform certain tasks in Access Requests. (OKTA-599130)

  • Requests weren't marked as Done automatically when the questions and tasks were completed. (OKTA-602191)

Release: 2023.03.3

Features and enhancements

Access Certifications
  • Multilevel Reviews

    Use this feature to set up two levels of approval within a single campaign. You can select which review items go to the second level. You can also view the information for closed multilevel review campaigns from the Past Campaign Details and Past Campaign Summary reports.

    This feature allows you to collect decisions from different sets of relevant stakeholders to ensure accurate decisions are made for your users’ access to resources. See Create campaigns.

    Note: Multilevel Reviews is an Early Access feature for orgs with Identity Governance enabled. Use the Early Access Feature Manager as described in Enable self-service features to enable the feature.

Access Requests
  • Improved UI for Settings page

    The SettingsIntegrations page in the Access Request console has been updated to improve clarity and enhance user experience. Your integrations are now grouped by their integration type.

Release: 2023.03.2

Features and enhancements

Access Requests
  • Impact of team deletion

    When you delete a team, all Request Types and associated requests are also deleted from the Access Requests console. You can no longer view the deleted requests in the Access Requests console. You can only view them from the Past Access Requests report.

Fixes

Identity Governance
  • An error occurred when importing group owners for AD groups if queries exceeded a maximum number of entities. (OKTA-540040)

Access Requests
  • Some customers were unable to edit or save Request Types.

  • When users were assigned the access requests administrator role through group assignments, they were unable to perform admin-specific tasks. (OKTA-581692)

Release: 2023.03.1

Features and enhancements

Access Requests
  • Settings page update

    The Settings page user interface has been updated to improve user experience and the following tabs have been added:

    • Resources

    • Configuration lists

    • Pushed groups

    The following terms have also been updated to improve clarity and reduce confusion:

    • Resource lists synced directly from an integration are called Resources.

    • Sublists and admin-defined configuration lists are called Configuration lists.

    See Components and Create a configuration list.

Fixes

Access Requests
  • Some group owners didn't receive an email notification when they were assigned an approval task in a Request Type.

Release: 2023.03.0

Features and enhancements

Identity Governance
  • Group owner functionality for Universal Directory available in Production environments

    Admins can now view and manage the owners of a group in OktaUniversal Directory. A group can have a maximum of 10 owners. This feature allows you to manage resource owners centrally when the resource ownership changes, and reduces the need to update your configurations manually. See Group ownership.

  • Import group owner information from AD available in Production environments

    Admins can now import the group ownership information from AD to Okta Directory using full or incremental imports. The group owner is extracted from a managedBy attribute in AD user profile.

    This feature reduces the need to manually define group owners for AD-sourced groups that have been imported to Okta. See Import group owner from Active Directory.

Access Certifications

  • Additional reviewer type options available in Preview environments

  • While creating or editing an Access Certification campaign, now you can select one of the following options from the Select reviewer type dropdown menu.

    • A specific user

    • User's manager

    • Group

    • Group owner
    • Define using Okta Expression Language

    This feature allows you to select a Group and Group owner as reviewer types. As a result, you can take the following actions:

    • Assign reviews to multiple users at the same time to make review decisions when you have multiple application owners or a reviewer might be out of office.

    • Leverage the same Okta group that you use in Access Requests in Access Certifications as well. This also minimizes the need to manually update reviewers in campaigns when the reviewers change.

    See Create campaigns.

Access Requests
  • Group owner approvals for Access Requests

    Now you can assign group owners as task assignees or approvers in a Request Type. This feature allows you to create a single Request Type instead of multiple Request Types when you need to reference groups with different group owners as approvers. See Create a Request Type and Group ownership.

Release: 2023.02.1

Features and enhancements

Access Requests
  • Change to new Request Types

    For new Request Types, you can no longer select an integration’s source list as a Configuration items value for questions and conditional logic. While it’s not recommended, you can still use source lists for tasks in a Request Type.

    Existing Request Types that use source lists are unaffected with this change because the system creates reusable sublists for them.

Fixes

Access Requests
  • You could configure a Request Type to use applications and groups that weren't available for your team.

Release: 2023.02.0

Features and enhancements

Identity Governance
  • Group owner functionality for Universal Directory available in Preview environments

    Admins can now view and manage the owners of a group in OktaUniversal Directory. A group can have a maximum of 10 owners. This feature allows you to manage resource owners centrally when the resource ownership changes, and reduces the need to update your configurations manually. See Group ownership.

  • Import group owner information from AD available in Preview environments

    Admins can now import the group ownership information from AD to Okta Directory using full or incremental imports. The group owner is extracted from a managedBy attribute in AD user profile.

    This feature reduces the need to manually define group owners for AD-sourced groups that have been imported to Okta. See Import group owner from Active Directory.

Access Certifications

  • UI enhancements

    For active campaigns, the Review details view is now available as a panel next to the review item. As well, the Reviewer and status details section has been updated and split into Reviewer details and Certification details sections. See View the progress of an active campaign.

Release: 2023.01.2

Fixes

Access Requests
  • Some requests didn't resolve automatically when access was granted to two apps or groups at the same time.

  • Some task approvers couldn’t take action from the email notification because the email didn’t contain the Open Tasks section.

  • Sometimes second-level approvers didn’t receive a Slack notification when a request was assigned to them.

Release: 2023.01.1

Features and enhancements

Access Requests
  • Remove Request Action menu

    Admins can no longer manually overwrite the original request using the Request Action menu in the header panel.

Release: 2023.01.0

Features and enhancements

Access Certifications
  • UI enhancements

    For Access Certifications campaigns, the user, group, and app dropdown menus now display an icon next to each selection. In addition, the group dropdown menu now displays the number of assigned users and apps, and the app dropdown menu now displays the app status and the app ID.

    Since a user, group, or an app name isn't always unique, this enhancement provides more context to you for the resources you select. As well, these enhancements allow you to configure campaigns for the correct users, groups, and apps.

  • Additional reviewer type options available in Preview environment

  • While creating or editing an Access Certification campaign, now you can select one of the following options from the Select reviewer type dropdown menu.

    • A specific user

    • User's manager

    • Group

    • Group owner
    • Define using Okta Expression Language

    This feature allows you to select a Group and Group owner as reviewer types. As a result, you can take the following actions:

    • Assign reviews to multiple users at the same time to make review decisions when you have multiple application owners or a reviewer might be out of office.

    • Leverage the same Okta group that you use in Access Requests in Access Certifications as well. This also minimizes the need to manually update reviewers in campaigns when the reviewers change.

    See Create campaigns.

Access Requests
  • View user's email address

    When adding users to a team, you can now view a user’s email address in addition to their name in the Add team members dialog. This allows you to pick the correct user when you have multiple users with the same name.

Release: 2022.12.2

Features and enhancements

Access Certifications
  • Campaign violation warnings

    A warning message now appears instead of a campaign launch failure when an admin launches a campaign that includes invalid or missing resources.

  • Admin experience enhancements

    Campaigns now end when all reviewers in the campaign complete their reviews. See Campaigns.

    The following options now are available when creating or modifying a campaign:

    • Users: Only include active Okta users in this campaign: This option is only available for resource campaigns that include groups as resources. See User settings

    • Reviewers:

      1. Require justification: This option makes it mandatory for reviewers to enter a justification for their decision to approve or revoke a user's access to a resource.

      2. Disable bulk edit: This option prevents reviewers from selecting multiple reviews to approve or revoke. Reviewers can still reassign multiple reviews to another user.

    See Reviewer settings.

Fixes

Access Certifications
  • When an admin used the Okta Expression Language to scope users to the dateValue profile attribute on a campaign, an warning appeared if the attribute was set to less than or equal to three days from the current date. (OKTA-645299)

Release: 2023.09.0

Features and enhancements

Access Requests
  • Changes to the request UI

    The UI for requests in the Access Requests web app has been updated to improve the user experience for approvers and request assignees:

    • Request details such as the request type, team, assignee, and tags are now located on the center panel instead of the right panel.

    • Actions and Activity tabs have been added to the center panel.

      • The Actions tab contains Tasks and Questions sections. See Manage tasks.

      • The Activity tab contains a log of changes or events for the request.

    • The chat has been decoupled from Activity and is now located on the right panel.

  • Sync Okta groups and apps automatically

    Now applications and groups on the Resources tab sync automatically with Okta. You don't need to click Update now before using the app or group that you recently created in Okta.

Release: 2023.08.2

Fixes

Access Certifications
  • When editing a scheduled resource campaign, admins received an error and couldn't save their changes if a resource included in the campaign was deleted from Okta. (OKTA-637849)

Release: 2023.08.0

Features and enhancements

Access Certifications
  • Disable self-review

    Admins now have the ability to disable self-review for campaigns while defining campaign reviewers. This option provides you the flexibility to allow or disallow self-reviews for each campaign. See Campaign settings.

  • User campaigns are now available in Production environments

    User campaigns provide you with a comprehensive view of users' access to resources. They help you tackle elevated access challenges that arise when users' relationship with the organization changes due to events such as role, department, or project change. You can configure these campaigns to only include individually assigned resources, thereby reducing the need for reviewers to review group-assigned resources governed by group membership and rules. See Campaigns.

Access Requests
  • Past Access Requests report improvements

    The Past Access Requests report now displays requests that were approved automatically. In addition, you can also filter the report using Auto approved as a value for the Decision filter.

  • Contextual information for requests

    The contextual data for actions is now available to Access requests administrators and to all members of the team that owns the request type but is unavailable to requesters. In addition, the link to Okta Workflows console is included as contextual data for the Run a workflow action.

Fixes

Access Certifications
  • The Past Campaign Details report didn't always display the reviewer's name. (OKTA-630255)

Access Requests
  • Approvers didn't receive Slack notifications when they or a request assignee completed a task assigned to them.

Release: 2023.07.2

Fixes

Access Certifications
  • The Past Campaign Details report didn't always display the reviewer's name. (OKTA-630255)

Access Requests
  • Approvers didn't receive Slack notifications when they or a request assignee completed a task assigned to them.

Release: 2023.07.1

Fixes

Access Certifications
  • Scheduled campaigns failed to launch if the reviewer type was User's manager and a user's manager was deleted from Okta. (OKTA-628087)

  • While previewing users, admins received an incorrect error message if the Okta Expression Language expression couldn't find the referenced object. (OKTA-628105)

  • Admins couldn't view a campaign's details if they specified a group that should be excluded from the User campaign and then deleted the group in Okta. (OKTA-629574)

Release: 2023.07.0

Features and enhancements

Access Certifications
  • Review details panel enhancement

    When reviewing items, the group description is now visible to reviewers (if one exists for the group). This helps reviewers make an informed decision to approve or deny user's access to the group.

  • User campaigns is now available in Preview environments

    User campaigns provide you with a comprehensive view of users' access to resources. They help you tackle elevated access challenges that arise when users' relationship with the organization changes due to events such as role, department, or project change. You can configure these campaigns to only include individually assigned resources, thereby reducing the need for reviewers to review group-assigned resources governed by group membership and rules. See Campaigns.

Access Requests
  • Okta Workflows actions for Access Requests

    Adding a Run a workflow action task in a Request Type allows requests to run a delegated flow automatically. This feature lets you use your existing Workflows connectors and flows in Access Requests to further automate requests. See Before you begin.

  • Removed ability to change the requester

    Admins and request assignees can no longer change the requester after the request is submitted. They can either reject the tasks for the request or ask the requester to cancel the request.

Release: 2023.06.2

Features and enhancements

Access Requests
  • Just-in-time assignments

    When Request Types have conditional logic for tasks and questions, users are now assigned tasks and questions only after the prerequisite dependencies are fulfilled. This reduces confusion for users because they're only assigned tasks or questions that they can take action on.

Fixes

Access Certifications
  • When reassigning review items, reviewers were unable to search for the new reviewer using their first and last name. (OKTA-443831)

  • The resource's assignment date was checked at the time of remediation, which slowed the remediation process. (OKTA-582449)

  • You could only have either a user or a group as the Group owner reviewer type. (OKTA-587264)

Access Requests
  • Admins and team members could view and click the Edit draft button for Requests Types that they didn't own.

Release: 2023.06.1

Features and enhancements

Access Requests
  • New operator for Request Type

    The includes operator provides more flexibility in the conditional logic that references a Dropdown input type. This is useful when configuring Request Types that reference multiple resources.

  • Cancel requests

    Requesters now have the flexibility to cancel a request if a team member or approver hasn't taken any action on it. They can only cancel the request from the Access Requests web app. Access Requests cancels a request if the user's access to the Access Requests web app is revoked or their status in Okta changes to suspended or deactivated. This feature improves productivity for team members and approver by reducing the incorrect requests that they need to manage.

  • New System Log event for canceled requests

    The System Log now records an access.request.cancel event when a request is canceled.

Fixes

Identity Governance
  • Okta Workflows failed to invoke some Access Certifications and Access Requests API endpoints. (OKTA-618561)

Release: 2023.06.0

Features and enhancements

Access Certifications
  • Multilevel Reviews is now available in Production environments

    Use this feature to set up two levels of approval within a single campaign. You can select which review items go to the second level. You can also view the information for closed multilevel review campaigns from the Past Campaign Details and Past Campaign Summary reports.

    This feature allows you to collect decisions from different sets of relevant stakeholders to ensure accurate decisions are made for your users' access to resources. See Create campaigns.

  • API support for features

    Recurring campaigns, Additional reviewer type options, Multilevel reviews, and User campaigns features are now supported by APIs.

Access Requests
  • Supported file types

    You can now upload and download all file types in the Access Requests web app chat. When you download a file from the chat, the original name and file type are retained.

Fixes

Access Requests
  • The new name of the team was reflected only after you refreshed the team's page.

  • The conditional logic for new approval tasks defaulted to is completed instead of is approved.

Release: 2023.05.3

Features and enhancements

Access Certifications
  • User campaigns

    User campaigns provide you with a comprehensive review of users' access to resources. They help you tackle elevated access challenges that arise when users' relationship with the organization changes due to events such as, role, department, or project change. You can configure these campaigns to only include individually assigned resources, thereby reducing the need for reviewers to review group-assigned resources governed by group membership and rules. See Campaigns.

    Note: User campaigns is an Early Access feature. To learn how to enable it, see Enable self-service features.

Fixes

Access Certifications
  • Campaigns on the Active, Scheduled, and Closed tabs weren't sorted in the default order of the most recent campaign first. (OKTA-607347)

  • The Past Campaign Details report didn't display the reviewer name. (OKTA-613193)

  • Reviewers were unable to take any action on their pending review items if the user who created the campaign was deleted from Okta. (OKTA-613929)

Access Requests
  • Approvers didn't receive email notifications about their open tasks if they weren't a team member or request assignee, if they'd previously viewed the request, or if the request had interdependent tasks. (OKTA-608756)

  • When users requested access, the response dropdown menus associated with questions didn't render properly in the Access Requests web app. (OKTA-613362)

Release: 2023.05.1

Fixes

Access Certifications
  • Some campaign pages were rendered blank if you edited a campaign after deleting or deactivating a critical resource, such as an excluded user or a reviewer group. (OKTA-594828 and OKTA-604498)

  • Reviewers didn't receive email notifications if a campaign with a high volume of reviewer items had Groups as the reviewer type. (OKTA-608517)

Access Requests
  • When filing a request in the Access Requests console, users couldn't view some Request Type questions.

Release: 2023.05.0

Features and enhancements

Access Certifications
  • Multilevel Reviews is now available in Preview environments

    Use this feature to set up two levels of approval within a single campaign. You can select which review items go to the second level. You can also view the information for closed multilevel review campaigns from the Past Campaign Details and Past Campaign Summary reports.

    This feature allows you to collect decisions from different sets of relevant stakeholders to ensure accurate decisions are made for your users' access to resources. See Create campaigns.

Fixes

Access Certifications
  • Reviewers received some email notifications with incorrect campaign due date timestamps. (OKTA-602462)

Release: 2023.04.3

Fixes

Access Requests
  • Some users didn't receive email notifications for pending approval requests. (OKTA-604594)

Release: 2023.04.2

Fixes

Access Requests
  • When a Request Type with multiple tasks was used for submitting requests, users received multiple duplicate messages and errors. (OKTA-591260)

  • Access request admins who had a custom user type were unable to perform certain tasks in Access Requests. (OKTA-599130)

  • Requests weren't marked as Done automatically when the questions and tasks were completed. (OKTA-602191)

Release: 2023.03.3

Features and enhancements

Access Certifications
  • Multilevel Reviews

    Use this feature to set up two levels of approval within a single campaign. You can select which review items go to the second level. You can also view the information for closed multilevel review campaigns from the Past Campaign Details and Past Campaign Summary reports.

    This feature allows you to collect decisions from different sets of relevant stakeholders to ensure accurate decisions are made for your users' access to resources. See Create campaigns.

    Note: Multilevel Reviews is an Early Access feature for orgs with Identity Governance enabled. Use the Early Access Feature Manager as described in Enable self-service features to enable the feature.

Access Requests
  • Improved UI for Settings page

    The SettingsIntegrations page in the Access Request console has been updated to improve clarity and enhance user experience. Your integrations are now grouped by their integration type.

Release: 2023.03.2

Features and enhancements

Access Requests
  • Impact of team deletion

    When you delete a team, all Request Types and associated requests are also deleted from the Access Requests console. You can no longer view the deleted requests in the Access Requests console. You can only view them from the Past Access Requests report.

Fixes

Identity Governance
  • An error occurred when importing group owners for AD groups if queries exceeded a maximum number of entities. (OKTA-540040)

Access Requests
  • Some customers were unable to edit or save Request Types.

  • When users were assigned the access requests administrator role through group assignments, they were unable to perform admin-specific tasks. (OKTA-581692)

Release: 2023.03.1

Features and enhancements

Access Requests
  • Settings page update

    The Settings page user interface has been updated to improve user experience and the following tabs have been added:

    • Resources

    • Configuration lists

    • Pushed groups

    The following terms have also been updated to improve clarity and reduce confusion:

    • Resource lists synced directly from an integration are called Resources.

    • Sublists and admin-defined configuration lists are called Configuration lists.

    See Components and Create a configuration list.

Fixes

Access Requests
  • Some group owners didn't receive an email notification when they were assigned an approval task in a Request Type.

Release: 2023.03.0

Features and enhancements

Identity Governance
  • Group owner functionality for Universal Directory available in Production environments

    Admins can now view and manage the owners of a group in OktaUniversal Directory. A group can have a maximum of 10 owners. This feature allows you to manage resource owners centrally when the resource ownership changes, and reduces the need to update your configurations manually. See Group ownership.

  • Import group owner information from AD available in Production environments

    Admins can now import the group ownership information from AD to Okta Directory using full or incremental imports. The group owner is extracted from a managedBy attribute in AD user profile.

    This feature reduces the need to manually define group owners for AD-sourced groups that have been imported to Okta. See Import group owner from Active Directory.

Access Certifications

  • Additional reviewer type options available in Preview environments

  • While creating or editing an Access Certification campaign, now you can select one of the following options from the Select reviewer type dropdown menu.

    • A specific user

    • User's manager

    • Group

    • Group owner
    • Define using Okta Expression Language

    This feature allows you to select a Group and Group owner as reviewer types. As a result, you can take the following actions:

    • Assign reviews to multiple users at the same time to make review decisions when you have multiple application owners or a reviewer might be out of office.

    • Leverage the same Okta group that you use in Access Requests in Access Certifications as well. This also minimizes the need to manually update reviewers in campaigns when the reviewers change.

    See Create campaigns.

Access Requests
  • Group owner approvals for Access Requests

    Now you can assign group owners as task assignees or approvers in a Request Type. This feature allows you to create a single Request Type instead of multiple Request Types when you need to reference groups with different group owners as approvers. See Create a Request Type and Group ownership.

Release: 2023.02.1

Features and enhancements

Access Requests
  • Change to new Request Types

    For new Request Types, you can no longer select an integration's source list as a Configuration items value for questions and conditional logic. While it's not recommended, you can still use source lists for tasks in a Request Type.

    Existing Request Types that use source lists are unaffected with this change because the system creates reusable sublists for them.

Fixes

Access Requests
  • You could configure a Request Type to use applications and groups that weren't available for your team.

Release: 2023.02.0

Features and enhancements

Identity Governance
  • Group owner functionality for Universal Directory available in Preview environments

    Admins can now view and manage the owners of a group in OktaUniversal Directory. A group can have a maximum of 10 owners. This feature allows you to manage resource owners centrally when the resource ownership changes, and reduces the need to update your configurations manually. See Group ownership.

  • Import group owner information from AD available in Preview environments

    Admins can now import the group ownership information from AD to Okta Directory using full or incremental imports. The group owner is extracted from a managedBy attribute in AD user profile.

    This feature reduces the need to manually define group owners for AD-sourced groups that have been imported to Okta. See Import group owner from Active Directory.

Access Certifications

  • UI enhancements

    For active campaigns, the Review details view is now available as a panel next to the review item. As well, the Reviewer and status details section has been updated and split into Reviewer details and Certification details sections. See View the progress of an active campaign.

Release: 2023.01.2

Fixes

Access Requests
  • Some requests didn't resolve automatically when access was granted to two apps or groups at the same time.

  • Some task approvers couldn't take action from the email notification because the email didn't contain the Open Tasks section.

  • Sometimes second-level approvers didn't receive a Slack notification when a request was assigned to them.

Release: 2023.01.1

Features and enhancements

Access Requests
  • Remove Request Action menu

    Admins can no longer manually overwrite the original request using the Request Action menu in the header panel.

Release: 2023.01.0

Features and enhancements

Access Certifications
  • UI enhancements

    For Access Certifications campaigns, the user, group, and app dropdown menus now display an icon next to each selection. In addition, the group dropdown menu now displays the number of assigned users and apps, and the app dropdown menu now displays the app status and the app ID.

    Since a user, group, or an app name isn't always unique, this enhancement provides more context to you for the resources you select. As well, these enhancements allow you to configure campaigns for the correct users, groups, and apps.

  • Additional reviewer type options available in Preview environment

  • While creating or editing an Access Certification campaign, now you can select one of the following options from the Select reviewer type dropdown menu.

    • A specific user

    • User's manager

    • Group

    • Group owner
    • Define using Okta Expression Language

    This feature allows you to select a Group and Group owner as reviewer types. As a result, you can take the following actions:

    • Assign reviews to multiple users at the same time to make review decisions when you have multiple application owners or a reviewer might be out of office.

    • Leverage the same Okta group that you use in Access Requests in Access Certifications as well. This also minimizes the need to manually update reviewers in campaigns when the reviewers change.

    See Create campaigns.

Access Requests
  • View user's email address

    When adding users to a team, you can now view a user's email address in addition to their name in the Add team members dialog. This allows you to pick the correct user when you have multiple users with the same name.

Release: 2022.12.2

Features and enhancements

Access Requests Updates to request requirements
  • Requests submitted using email or the Access Requests Console must include a Request Type. This is to enable a smoother request approval flow. See Create requests.

  • Only team members can edit requests associated with that team. This also applies to super administrators and access requests administrators.

  • Team members can't remove a team or assignee from a request. They can only update the assignee.

Fixes

Access Certifications While approving or revoking access, reviewers had to click the textbox multiple times to enter a business justification. (OKTA-535909)

Release: 2022.12.1

Fixes

Access Requests When a Jira ticket was created automatically for a team, its issue type was set to the first issue type configured in the Jira integration. (OKTA-554537)

Release: 2022.12.0

Access Certifications

Features

  • Additional reviewer type options

    While creating or editing an Access Certification campaign, now you can select one of the following options from the Select reviewer type dropdown menu.

    • A specific user

    • User's manager

    • Group

    • Group owner
    • Define using Okta Expression Language

    This feature allows you to select a Group and Group owner as reviewer types. As a result, you can take the following actions:

    • Assign reviews to multiple users at the same time to make review decisions when you have multiple application owners or a reviewer might be out of office.

    • Leverage the same Okta group that you use in Access Requests in Access Certifications as well. This also minimizes the need to manually update reviewers in campaigns when the reviewers change.

    See Create campaigns.

    This is an Early Access feature for orgs with Identity Governance enabled. Use the Early Access Feature Manager as described in Enable self-service features to enable the feature.

Fixes

  • The message There are no more pending reviews for this campaign was displayed when you searched for a user or reviewer's pending review items in an active campaign. (OKTA-549609)

Access Requests

Enhancements

  • Improvements to Access Requests

    • When you sign in after your session expires, you are now taken to the last page that you visited instead of being taken to your requests Inbox.

    • When you click the email action link without signing in, you're now asked to sign in instead of displaying an error.

    • Date fields are now localized properly even when you can't edit the field.

Release: 2022.11.1

Deployment date: Nov 30, 2022

Identity Governance

Access Requests

Enhancements

  • Update to request requirements

    Requests submitted using Slack or Microsoft Teams must include a request type. This is to enable a smoother request approval flow.

  • Add Task button removed

    Approvers can't add custom tasks to a request.

  • Remove ability to archive items

    You can no longer archive items from configuration lists and sublists. However, you can now delete items from the sublists.

Fixes

  • After syncing a configuration list, items archived from a sublist didn't stay in the archive.

Release: 2022.11.0

Deployment date: Nov 3, 2022

Identity Governance

Access Requests

Enhancements

  • New System Log events for access requests
    A new System Log event appears when an access request is created and also when it is resolved.


  • Autopopulate groups
    Based on the requester's responses in the Teams and Request Type fields in a request, a group is automatically populated using AI prediction models. This is only applicable if the following conditions are met:

    • The question in a Request Type has Dropdown as the input type.
    • The selected Dropdown option is associated with an Okta resource list that contains groups only.

Reports

Enhancements

  • New column for the Past Campaign Details report
    The CSV export of the Past Campaign Details report now contains a reviewItem.revoked column. The column contains a time stamp for when a user's access to a resource was revoked. This functionality provides visibility into the remediation time frame of a campaign and helps you meet audit requirements.

Release: 2022.10.2

Deployment date: Oct 26, 2022

Identity Governance

Access Requests

Enhancements

  • Enhancements for Jira and ServiceNow integrations
    If you have integrated Jira or ServiceNow with Access Requests, you can now create sublists for these integrations. This allows you to control the options available to users when processing requests. See Create a configuration list.

Release: 2022.10.0

Deployment date: Oct 5, 2022

Identity Governance

Access Certifications

Production features

The following features are now generally available on Production environments.

  • Access certifications administrator role

  • Recurring campaigns

Enhancements

  • Enhancements to the Review Details pane

    In the Resource details section of the Review details pane, reviewers can now see when an application was assigned to the user and when the user's access to an application or group was last reviewed. This provides historical context for the resource being reviewed across campaigns.

Access Requests

Production features

The following features are now generally available on Production environments.

  • Access requests administrator role

Enhancements

  • Deprecate some actions for Okta integration

    For the Okta integration in the Access Requests console, the following actions are now deprecated for new Requests and Request Types:

    • Reset user password

    • Unlock user

    • Activate user

    • Deactivate user

    • Suspend user

    • Unsuspend user

    • List enrolled MFA for user

    • Reset all user MFA

    • Clear all user sessions

  • Security enhancement for email

    As an increased security measure, now you must be signed in to Access Requests to approve, deny, and complete a task for a request using the action link in email notification. In addition, these action links in the emails from before October 3, 2022, will no longer work even if you're signed in.

Fixes

  • Admins couldn't disable the Create issue toggle when they attempted to edit the Jira connection.

  • The Jira resource list option wasn't available on the SettingsConfiguration page of the Access Requests console. Consequently, the Jira projects option wasn't available in the list of configuration options when admins attempted to automate Jira issue creation.

Reports

Production features

The following features are now generally available on Production environments.

  • Past Access Requests report

Release: 2022.09.3

Deployment date: Sep 28, 2022

Identity Governance

Access Certifications

Fixes

  • Users received email notifications for Access Certifications campaigns on both their primary and secondary email addresses. (OKTA-530589)

Release: 2022.09.1

Deployment date: Sep 14, 2022

Identity Governance

Access Certifications

Fixes

  • Campaigns launched successfully even when the user scope was defined using Okta Expression Language and no users met the expression criteria. (OKTA-518924)

  • The wrong campaign opened occasionally when admins attempted to edit a scheduled campaign immediately after editing another scheduled campaign. (OKTA-527511)

Access Requests

Enhancements

  • Prevent changes after submitting requests
    • Now requesters can't modify the questions after they submit a Request Type.

    • Only request assignees can update answers after submission.

    • Admins can only assign requests to members of team, which owns the Request Type.

  • Disable Request Types and notify admins

    A Request Type is disabled in the following scenarios:

    • When you remove an item from a list that is associated with an active Request Type.

    • When you delete a team that is associated with a Request Type.

    Admins now receive an email notification when the Request Type is disabled to make the required modifications. See Modify a list.

Release: 2022.09.0

Deployment date: Aug 31, 2022

Identity Governance

Features

  • Group owner functionality for Universal Directory

    Admins can now view and manage the owners of the group in Okta Universal Directory. A group can have a maximum of 10 owners. See Group ownership.

    With this feature, you can use Okta Expression Language expressions to specify group owners as reviewers for an Access Certifications campaign. This allows you to centrally manage reviewers for a resource associated with a campaign without updating the campaign configuration when the resource ownership changes. See Define dynamic reviewers.

    This is a self-service early access feature for Okta Identity Governance customers. To enable it, use the Early Access Feature Manager as described in Enable self-service features.

  • Import group owner information from AD

    Admins can now import the group ownership information from AD to Okta Directory using full or incremental imports. The group owner is extracted from a managedBy attribute in AD user profile. Note that AD can have only one owner for a group, either a group or a user, so the imported group can also have only one owner. See Import group owner from Active Directory.

    This is a self-service early access feature for Okta Identity Governance customers. To enable it, use the Early Access Feature Manager as described in Enable self-service features.

Access Certifications

Features

  • Automatically assign the Access Certifications app

    When you assign the access certifications administrator role to a user or group, they're automatically assigned to the Access Certifications app. This is available to orgs with the access certifications administrator role enabled. See Access certifications administrators.

Preview features

The following features are now generally available on Preview environments.

  • Access certifications administrator role

  • Recurring campaigns

Fixes

  • OKTA-525684

    When reviewers bulk approved or revoked review items that had different groups associated with them, System.DebugContext.DebugData in System Log events displayed the first group for all items.

Access Requests

Features

  • Automatically assign the Request Access app

    When you assign the access requests administrator role to a user or group, they're automatically assigned to the Request Access app. This is available to orgs with the access requests administrator role enabled. See Access requests administrators.

Preview features

The following features are now generally available on Preview environments.

  • Access requests administrator role

Reports

Enhancements

  • UI text update

    For the Past Access Requests report, the column header and filter labels have been changed from Requester Name to Requester and Approver Name to Approver.

Preview features

The following features are now generally available on Preview environments.

  • Past Access Requests report

Release: 2022.08.0

Deployment date: Aug 03, 2022

Identity Governance

Okta Identity Governance is now generally available on Production environments.

Access Certifications

Features

  • Access certifications admin role

    You can now assign the access certifications standard admin role to your users instead of the super admin role. An access certifications admin can create and manage campaigns for Okta resources, such as users, groups, and applications. This role helps you control the level of access a user needs to perform their tasks. See Access certifications administrators.

    This is an early access feature. To enable it for your org, contact Okta Support.

  • Recurring campaigns
    You can now set up a recurrence schedule for campaigns to allow them to run periodically. This helps you save time and increases productivity. You now have the flexibility to set up a specific start time when you create a campaign instead of having it launch at midnight by default. See Create campaigns.

    This is a self-service early access feature. To enable it, use the Early Access Feature Manager as described in Enable self-service features.

Production features

The following features are now generally available on Production environments.

  • View known entitlements

  • Campaign history

Access Requests

Features

  • Access Requests admin role

    Orgs can assign the Access Requests standard admin role to users instead of the super admin role. This role allows a user to view all Okta users and groups, manage app permissions and assignments within Access Requests, and act as an admin within the Access Requests Console. Using this role helps orgs to better control which actions are available to users. See Access requests administrators.

    This is an early access feature. To enable it, contact Okta Support.

  • Export data feature
    The Export feature allows Access Requests admins can export data from the Access Requests Console. Exports can define how Request Types are organized, log which data is available in a configuration list, or list the specific actions taken for individual requests. This data helps orgs retain a clear record of the information available to Access Requests and how requests are processed. See Export data from Access Requests.
  • Time-Bound tasks
    Time-Bound tasks allow orgs to control the flow and timing of actions within a request. These tasks are available when a team creates a Request Type, and can schedule follow-up actions on a specific date, or after a specific duration of time. These tasks allow teams to better schedule how the system processes requests. See Create a Request Type.

Enhancements

Access Requests Workflows are now called Request Types.

Reports

Features

  • New Identity Governance report
    To aid with compliance and audits, the Past Access Requests report provides information on users that have requested access to org resources, and details related to the outcome of the request. See Past Access Requests report.
    This is a self-service early access feature. To enable it, see Enable self-service features.

Release: 2022.07.0

Deployment date: Jul 07, 2022

Identity Governance

Okta Identity Governance is a SaaS-delivered, converged, and intuitive Identity and Access management platform. Use it to simplify and manage your identity and access lifecycles across multiple systems and improve the overall security of your company.

Use Okta Identity Governance solutions, such as Access Certifications, Access Requests, and Reports to:

  • Efficiently create, protect, and audit access to critical resources.
  • Improve your company's security.
  • Increase employee productivity.
  • Improve IT efficiency by automating tasks to reduce the time taken and errors associated with manual data entry and provisioning tasks.

Access Certifications

Use Access Certifications to periodically create reviews of your users' access to applications or groups in Okta. Reviewers can approve or revoke access or reassign the review item to another user directly in the Okta Admin Console. Once the reviewer makes a decision, the remediation of a user's access begins automatically. This ensures that only users who need a resource have access to it and there is no accumulation of elevated or privileged access to a resource.

See Access Certifications.

Features

  • View known entitlements feature

    The View known entitlements self-service feature identifies the groups, licenses, permissions, and roles assigned to specific users within an Access Certification campaign. Currently this feature only syncs data from a limited number of apps: AWS, Box, Netsuite, Office 365, and Salesforce. See Review campaigns.

  • Campaign history

    For each review item, admins and reviewers can now see a history for that item, which includes details about the assignment, business justification for reassignment, details of the assigned reviewer, and the final decision of the reviewer. This information is available on the Review details pane of a review item.

Enhancements

  • Remediation actions for unreviewed users

    When an Access Certification campaign ends early, the End Campaign dialog allows admins to specify if an action is performed on unreviewed users. See Modify campaign's end date .

Access Requests

Use Access Requests to automate the process of requesting access to applications and resources. Access Requests delivers a streamlined and frictionless approach that automatically routes user requests to one or more reviewers for action.

See Access Requests

Reports

Use Access Certifications Campaigns reports, such as, Campaign Details and Campaign Summaries to obtain information on previously completed campaigns. You can also export the reports from Okta.

See Identity Governance Reports.

Date: June 15, 2022

Access Certifications

  • Improved visibility into campaign launch errors

    You can now view campaigns that failed the pre-launch check or failed to launch on the Closed tab of the Access Certification campaigns page and in the System Log. Select and open the campaign to view reasons for failure. This helps you identify and fix errors in the campaign.

  • OKTA-467193
  • Some of the buttons in the Create campaigns dialog were confusing and didn’t function as expected. The buttons have been renamed for clarity.

    1. When you create a campaign, the Exit button is now labeled Cancel.
    2. When you edit a scheduled campaign:
      • The Next button is now labeled Save and continue.
      • The Schedule campaign button is now labeled Update campaign.

  • OKTA-508375
  • Uncertified review items were marked as Reassigned instead of Not certified on the Closed tab of the Access certification campaigns page.

Date: June 8, 2022

Access Certifications

  • Visibility into campaign launch failures in System Log

  • When a campaign fails to launch or doesn't pass the pre-launch check, the System Log now displays the reason for failure. This helps you identify and correct the issue.

Date: May 4, 2022

Access Certifications

  • Email notification for campaign launch errors

  • Admins now get an email notification with a link to the campaign's page when the following errors occur at launch:

    • The number of review items is more than 10,000.

    • The fallback reviewer has been deactivated or deleted in Okta.

    • The resource (application or group) associated with the campaign has been deleted in Okta.

    • The campaign doesn’t have any review items.

    Use the link in the email notification to view errors. You can also get a head start on recreating the campaign by copying your campaign configuration, including the Okta Expression Language expressions for users and reviewers, from the Overview section. This functionality provides visibility in to campaigns that fails to launch. It also helps you identify and troubleshoot errors.

Date: March 30, 2022

Access Requests

  • Some orgs encountered issues while syncing Okta groups to Access Requests.

Date: March 23, 2022

Access Certifications

  • Third-party apps as a resource

    Admins can only include third-party apps as a resource when creating or modifying an Access Certifications campaign. This prevents reviewers from accidentally revoking an admin's access to the following first party apps:

    • Okta Workflows
    • Okta Admin Console
    • Okta Browser Plugin
    • Okta Admin Dashboard
    • Okta Access Certification
    • Okta Access Certification Reviews

Date: March 2, 2022

Identity Governance

Okta Identity Governance is a SaaS-delivered, converged, and intuitive Identity and Access management platform. Use it to simplify and manage your identity and access lifecycles across multiple systems and improve the overall security of your company.

Use Okta Identity Governance solutions, such as Access Certifications, Access Requests, and Reports to:

  • Efficiently create, protect, and audit access to critical resources.
  • Improve your company's security.
  • Increase employee productivity.
  • Improve IT efficiency by automating tasks to reduce the time taken and errors associated with manual data entry and provisioning tasks.

Access Certifications

Use Access Certifications to periodically create reviews of your users' access to applications or groups in Okta. Reviewers can approve or revoke access or reassign the review item to another user directly in the Okta Admin Console. Once the reviewer makes a decision, the remediation of a user's access begins automatically. This ensures that only users who need a resource have access to it and there is no accumulation of elevated or privileged access to a resource.

See Access Certifications.

Access Requests

Use Access Requests to automate the process of requesting access to applications and resources. Access Requests delivers a streamlined and frictionless approach that automatically routes user requests to one or more reviewers for action.

See Access Requests

Reports

Use Access Certifications Campaigns reports, such as, Campaign Details and Campaign Summaries to obtain information on previously completed campaigns. You can also export the reports from Okta.

See Identity Governance Reports.