Okta Identity Governance release notes

Release 2024.12.0

Features and enhancements

Discover inactive users and review admin access is generally available in Preview environments

You can now use preconfigured campaigns to discover inactive users who are assigned to apps and review their admin access. Preconfigured campaigns are a set of ready to use campaigns where Okta presets some default settings. See Campaigns.

Enhanced group remediation is generally available in Preview environments

Remediate user access to group-assigned apps automatically from the campaign. This reduces the need for manual remediation. See Understand remediation.

Automatically assign the Okta Access Certifications app

When you assign the super admin role to a user, the Okta Access Certifications app is automatically assigned.

Request access on behalf of another user

You can now allow users to request admin access for other users from their own dashboard. After you enable the option in the access requests conditions that manage admin role bundles, you can grant this permission to all users or limit it to managers only. See Create an access request condition.

Disable reassignments option

You can now configure a campaign to prevent reviewers who aren't super admins or access request admins from reassigning review items to other users. See Configure reviewer settings for resource campaigns or user campaigns.

Fixes

  • Sometimes users who didn't have the correct admin role and app assignments were able to manage access request conditions for some apps. (OKTA-823862)

  • Some groups weren't available to requesters for apps in the Resource catalog on the End-User Dashboard even if the groups were included in the access request condition for the app. (OKTA-830670)

  • The requestedBy user that created the request (/governance/api/v2/requests) wasn't the requestedBy user that was returned in the response. (OKTA-833234)

To view release notes prior to this release, see Okta Identity Governance release notes (Archive).