Okta Identity Governance release notes
Current release
Release 2026.01.2
Fixes
-
The Okta Username column didn't appear in the User Entitlements report even if you selected it while exporting the report. (OKTA-1074080)
-
The description specified in the endUserDisplayDescription group attribute wasn't displayed on the app tile on the End-User Dashboard if you didn't specify a name in the endUserDisplayName group attribute. (OKTA-1091949)
-
Sometimes, you couldn't duplicate a campaign if you selected 20 or more entitlement values individually for the resource. (OKTA-1101109)
Previous releases
Release 2026.01.1
Fixes
-
Sometimes, the Reviewer Reassigned column in the Campaign Details report didn't accurately state if the review item was reassigned or not. (OKTA-1070222)
-
Second-level reviewers sometimes received email notifications when they had no pending review items. (OKTA-1082780)
-
Campaigns didn't always launch if the Disable self-review option was active and the sole member of the reviewer group was assigned to the resource being reviewed. (OKTA-1089813)
-
For requests managed by access request conditions, the email and Microsoft Teams notifications for request approvals and denials didn't match the Slack notification UI. (OKTA-1096668)
Release 2026.01.0
Security access reviews is generally available in Production environments
Security access reviews are a new, security-focused type of user access review that can be automatically triggered by events. These reviews provide a unified view of a user's access, and contextual information about their access history including an AI-generated access summary, allowing you to investigate and take immediate remediation actions like revoking access. You also have the option to enable or disable the AI summary from the Governance AI tab of the Settings page. See Security access reviews.
Access Requests for AD Groups is generally available in Production environments
You can now manage access requests for Active Directory (AD)-sourced groups directly from Okta. This allows you to use AD groups when configuring access request conditions and enables users to request membership directly from their Okta dashboard. When a request is approved, the requester's access is granted in AD. It's also removed when it expires (if it's time-bound). Additionally, if you select a resource owner as a task assignee in an approval sequence, the AD-sourced group's manager is assigned to the task. This feature eliminates the need for duplicate Okta groups or custom workflows and supports creating a strong security posture with time-bound access. See Access governance for AD groups.
Escalate tasks is generally available in Production environments
Access request admins and request assignees can escalate stalled tasks within a request to the task assignee's manager. Requesters can also escalate tasks within their access requests if you've enabled the Allow requesters to escalate tasks toggle on the Settings page. This helps expedite request resolution, prevents bottlenecks, improves productivity, and helps reduce the use of risky workarounds. Task escalation is a secure, auditable, and automated process that helps you adopt time-based access request models by supporting both efficient operations and strong security postures. See Manage tasks and Allow requesters to escalate tasks.
Changes to the Campaign Summary report
If predefined user scope is selected for a resource campaign, then depending on the selection, the User scope column of the Campaign Summary report now shows either Users with no recent activity or Users with SOD conflicts.
New look and feel in the Access Requests email notifications
The Access Requests email notifications have a new look and feel, including updates to the text alignment, colors used, location of the Okta logo, and the addition of a gray background.
Changes to the group owner functionality in approval sequences
For approval sequences, you can now select the Resource Owner option if you want to assign the task to the group owner of the group specified in the Access level of the access request condition. Any existing approval sequences that had tasks assigned to a combination of Group owner and The group being requested have been automatically updated to Resource owner. You can continue to use the Group owner option to assign tasks to group owners of other groups (not specified in the access level of the access request condition). Additionally, the following approval sequence templates have been renamed:
-
Justification + Group Owner Approval is now Justification + Resource Owner Approval
-
Manager, Group Member & Owner Approvals is now Manager, Group Member & Resource Owner Approvals
Fixes
-
App group membership wasn't reflected properly when app groups were included as a resource in the campaign scope. (OKTA-1080290)
Release 2025.12.1
Fixes
-
When an admin selected access levels in conditions, very few results were listed and weren't sorted alphabetically. (OKTA-750764)
-
Users could be assigned to review their own access if they were a delegate for the original reviewer, even when the campaign was configured to disable self-reviews. (OKTA-1075557)
Release 2025.12.0
Features and enhancements
Certify service accounts
You can now create resource campaigns to review and certify access for both SaaS application and Okta service accounts. This feature extends your governance strategy to non-human identities, ensuring you maintain visibility and control over critical service account access. See Certify service accounts.
This is an Early Access release. See Enable self-service features.
Governance for Workflows
You can now use Okta Identity Governance to manage access to Workflows roles. This helps you ensure that access to Workflows is granted consistently and in compliance with your company's requirements. See Governance for Workflows.
This is an Early Access release. See Enable self-service features.
Access Requests for AD Groups is generally available in Preview environments
You can now manage access requests for Active Directory (AD)-sourced groups directly from Okta. This allows you to use AD groups when configuring access request conditions and enables users to request membership directly from their Okta dashboard. When a request is approved, the requester's access is granted in AD. It's also removed when it expires (if it's time-bound). Additionally, if you select a resource owner as a task assignee in an approval sequence, the AD-sourced group's manager is assigned to the task. This feature eliminates the need for duplicate Okta groups or custom workflows and supports creating a strong security posture with time-bound access. See Access governance for AD groups.
This feature is generally available in Preview environments but it's an Early Access release for Production environments.
Escalate tasks is generally available in Preview environments
Access request admins and request assignees can escalate stalled tasks within a request to the task assignee's manager. Requesters can also escalate tasks within their access requests if you've enabled the Allow requesters to escalate tasks toggle on the Settings page. This helps expedite request resolution, prevents bottlenecks, improves productivity, and helps reduce the use of risky workarounds. Task escalation is a secure, auditable, and automated process that helps you adopt time-based access request models by supporting both efficient operations and strong security postures. See Manage tasks and Allow requesters to escalate tasks.
This feature is generally available in Preview environments but it's an Early Access release for Production environments.
Resource labels is generally available in Production environments
Define labels for resources across Okta to enable better visibility, filtering, and automation within Access Certifications when scoping and maintaining campaigns. See Resource labels.
Delegated flow updates
Delegated flows now include a Caller input field. This allows you to pass more information to a flow that was called from another Okta product. For example, the requestID from Access Requests is now passed to the delegated flow. See Build a delegated flow.
Changes to access request approval by email
When you approve or deny requests from email, you now have five seconds after you click Approve or Deny to cancel your decision if you made a mistake. After that, your decision will be automatically applied.
Changes to preview user functionality
On the User page of the campaign wizard, Preview user is now called Preview expression scope. When you preview a user, Okta only validates the user against the Okta Expression Language expression that you specified. A user who matches the expression but isn't assigned to a resource in the campaign won't be included in the campaign.
Fixes
-
Separation of duty rules and conflict warnings didn't block requesters from submitting requests that would result in a conflict of separation of duty rules. (OKTA-1076749)
-
Active Directory groups weren't included as a resource in campaign scope. (OKTA-1080290)
Release 2025.11.3
Fixes
-
The Delegate tab on a user's profile page was visible to admins who didn't have the super admin role. (OKTA-1054121)
-
The app description defined in the Application notes for end users attribute was missing from the app tile's tooltip and the access request form in the End-User Dashboard. Also, this description didn't appear in the request details shown in the Okta Access Requests web app. (OKTA-1061859)
Release 2025.11.2
Fixes
-
Some admins couldn't create or launch security access reviews from the Admin Console in production environments. (OKTA-1053960)
Release 2025.11.1
Fixes
-
The collection name appeared on the Select entitlements page instead of the app name when an admin added an app to a resource collection. (OKTA-875089)
-
Users @mentioned in an access request Slack thread didn't receive a notification unless they were already a follower of the request. (OKTA-1053390)
Release 2025.11.0
Features and enhancements
Security access reviews is generally available in Preview environments
A security access review is a new, security-focused user access review that can be automatically triggered by events. These reviews provide a unified view of a user's access and contextual information about their access history including an AI-generated access summary. This allows you to investigate and take immediate remediation actions like revoking access. You also have the option to enable or disable the AI summary from the Governance AI tab of the Settings page. See Security access reviews.
Changes to security access reviews are generally available in Preview environments
-
For resources that require manual remediation, reviewers can now select Revoke access or Restore access. When a reviewer selects these, Okta records this action in the review history for an admin to take manual remediation action on. Okta also fires an access.review.action System Log event. See Review access.
-
You can now update the reviewer and end date of a security access review after it launches. See Manage Security Access Reviews .
Entitlement history is generally available in Preview environments
Admins can now access a user's entitlement history. This feature improves auditing and compliance tasks and enhances visibility for troubleshooting access issues. See View user entitlements.
Resource owners is generally available in Production environments
Assign owners to groups, apps, entitlements, and entitlement bundles. This feature allows you to automatically route access request steps and access certification campaign reviews to the correct stakeholder, improving the efficiency and accuracy of your governance processes. It also helps ensure that the right stakeholder is always involved in access decisions without requiring manual updates to your configurations.
-
Access Requests: When configuring approval sequences in access request conditions, you can now assign approvals, tasks, or questions directly to resource owners. Configure an approval sequence.
-
Access Certifications: When creating certification campaigns, you can now select the Resource Owner as the designated reviewer. See Certification campaign reviews.
See Resource owners.
Enhanced security for Okta Access Requests web app is generally available in Production environments
The Okta Access Requests web app now performs policy evaluations before granting new access tokens.
Export Okta Identity Governance reports in PDF format is generally available in Production environments
You can now export Okta Identity Governance reports to PDF. When exporting, you can also select specific columns to include in the report.
Universal Logout for Okta Access Requests web app
The Okta Access Requests web app now supports Universal Logout. This enables admins to automatically sign users out of this app when Universal Logout is triggered.
Fixes
-
When interacting with the Access Request web app using Safari browser, users couldn't tag another user with @ in the request's chat. (OKTA-1005685)
-
Deleted request types sometimes reappeared if the org had the Unified Requester Experience feature enabled. (OKTA-1040545)
-
The History section in the Review details panel didn't display the reviewer's decision if the campaign creator information was missing for recurring campaigns with multilevel reviews. (OKTA-1046833)
Release 2025.10.2
Features and enhancements
Enhanced security for Okta Access Requests web app is generally available in Preview environments
The Okta Access Requests web app now performs policy evaluations before granting new access tokens.
Fixes
-
When editing a request type or interacting with a request managed by request types, long text labels for dropdown menus and fields weren't rendered correctly and were missing their hover tooltips. (OKTA-993083)
-
Users with access request and app admin roles could see the Access Request tab on app profile page for various apps even if the app admin role was scoped to a specific app. (OKTA-1030035)
-
The Access Requests tab appeared on the app's profile page for API service apps. (OKTA-1035925)
-
The Resource access changes - Campaign launch to campaign complete report included details of users who weren't included in the campaign's user scope. (OKTA-1038132)
-
The Access Request - V2 APIs didn't support the client credentials authentication flow. (OKTA-1044065)
-
The History section in the Review details panel didn't display the reviewer's decision if the campaign creator information was missing for recurring campaigns with multilevel reviews. (OKTA-1046833)
Release 2025.10.1
Fixes
-
The client credential flow for API service apps didn't work for some governance API requests. (OKTA-926552)
-
Admins couldn't export Past Access Requests reports to PDF. (OKTA-997865)
Release 2025.10.0
Features and enhancements
Export Okta Identity Governance reports in PDF format is generally available in Preview environments
You can now export Okta Identity Governance reports to PDF. When exporting, you can also select specific columns to include in the report.
Entitlement history is generally available in Preview environments
Admins can now access a user's entitlement history. This feature improves auditing and compliance tasks and enhances visibility for troubleshooting access issues. See View user entitlements.
Resource owners is generally available in Preview environments
Assign owners to groups, apps, entitlements, and entitlement bundles. This feature allows you to automatically route access request steps and access certification campaign reviews to the correct stakeholder, improving the efficiency and accuracy of your governance processes. It also helps ensure that the right stakeholder is always involved in access decisions without requiring manual updates to your configurations.
-
Access Requests
When configuring approval sequences in access request conditions, you can now assign approvals, tasks, or questions directly to resource owners. Configure an approval sequence.
-
Access Certifications
When creating certification campaigns, you can now select the Resource Owner as the designated reviewer. See Certification campaign reviews.
See Resource owners.
Resource labels is generally available in Preview environments
Define labels for resources across Okta to enable better visibility, filtering, and automation within Access Certifications when you scope and maintain campaigns. See Resource labels.
Auditor reporting package is generally available on Production environments
Use this feature to automatically generate access certification campaign reports, which are tailored to meet auditor requirements. These reports make preparing for compliance audits faster and easier by reducing the time and manual effort required for assembling and exporting campaign and user access data. See Auditor reporting package.
Governance delegates is generally available in Production environments
You can set delegates for users or allow users to specify another user as a delegate to complete governance tasks for them. Governance tasks include access certification campaign review items and access request approvals, questions, and other tasks. After a delegate is specified, all future governance tasks (access request approvals and access certification reviews) are assigned to the delegate instead of the original approver or reviewer. This helps ensure that governance processes don't stall when approvers are unavailable or tasks need to be rerouted to a different stakeholder for a long period. It also reduces the time spent in reassigning requests and reviews manually. See Governance delegates.
New System Log event
The governance.settings.update System Log event is fired when super admins update the delegate settings to allow or block users from assigning their own delegate.
Changes to access request notifications
To ensure conversations are displayed consistently across platforms, messages sent within an access request from the web app now automatically appear for the message sender in the corresponding Slack or Microsoft Teams chat. This reduces confusion for the message sender around the messages associated that are with a request.
Changes to the Past Access Requests (Conditions) report
The Request subject column has been removed from the Past Access Requests (Conditions) report.
Fixes
-
Sometimes the Request access button wasn't available after you enabled the Unified Requester Experience feature if the org didn't have any access request conditions configured. (OKTA-1032205)
Release 2025.09.2
Fixes
-
Admins who were recently assigned the app and access request admin roles couldn't see the Access Requests tab on the app instance page. (OKTA-1020342)
-
Pending review emails were composed for all reviewers, regardless of whether they had any pending reviews. This issue resulted in the delivery of emails that contained no review items. (OKTA-1020491)
-
Sometimes campaigns failed to launch. (OKTA-1020732)
-
After being assigned to Salesforce and assigned an entitlement bundle through a workflow in Okta, some users weren't pushed and synced, and therefore weren't visible in Salesforce. (OKTA-1021934)
-
The entitlement description field wasn't imported into Okta through SCIM 2.0. (OKTA-935291)
Release 2025.09.1
Features and Enhancements
Removed delegate self-approval for Access Requests
Delegates can no longer approve requests made on their behalf, ensuring proper separation of duties.
Fixes
-
Access Certification email notifications for a changed campaign end date incorrectly displayed Pending reviews in the subject line. (OKTA-1007068)
-
User status in Okta Identity Governance wasn't correctly populated in an Access Certifications campaign for deactivated users. (OKTA-991451)
-
Admins who were recently assigned the app and access request admin roles couldn't see the Access Requests tab on the app instance page. (OKTA-1020342)
Release 2025.09.0
Features and Enhancements
Resource owners
Drive automation and simplify Okta Identity Governance (OIG) configuration by assigning owners to resources, such as apps, groups, and entitlements. See Resource owners.
This is an Early Access release. See Enable self-service features.
Resource labels
Define labels for resources across Okta to enable better visibility, filtering, and automation within Access Certifications when scoping and maintaining campaigns. See Resource labels.
This is an Early Access release. See Enable self-service features.
Auditor reporting package
Use this feature to automatically generate access certification campaign reports, which are tailored to meet auditor requirements. These reports make preparing for compliance audits faster and easier by reducing the time and manual effort required for assembling and exporting campaign and user access data. See Auditor reporting package.
This feature is an Early Access feature on Production environments but it's generally available on Preview environments.
Entitlement history
Admins can now access a user's entitlement history. This feature improves auditing and compliance tasks and enhances visibility for troubleshooting access issues. See View user entitlements.
This is an Early Access release. See Enable self-service features.
Changes to Access Certifications UI
The Campaigns tab on the Access Certification page has been renamed Certification campaigns. The + Create campaign button has been relocated to the Certification campaigns tab.
This is an Early Access release. See Enable self-service features.
Changes to Access Certifications limits
The following limits have been updated for resource campaigns:
-
Maximum number of resources included in a campaign has been increased from 50 to 250.
-
Maximum number of apps reviewing entitlements has been increased from 10 to 20.
For user campaigns, the maximum number of excluded resources has been increased from 50 to 100. You can exclude a maximum of 100 apps or groups, or a combination of both.
Changes to resource campaigns UI
When you select apps to include in a resource campaign, the search results for apps that have entitlements available are now suffixed with Entitlements in parenthesis.
Governance delegates
You can set delegates for users or allow users to specify another user as a delegate to complete governance tasks for them. Governance tasks include access certification campaign review items and access request approvals, questions, and other tasks. After a delegate is specified, all future governance tasks (access request approvals and access certification reviews) are assigned to the delegate instead of the original approver or reviewer. This helps ensure that governance processes don't stall when approvers are unavailable or tasks need to be rerouted to a different stakeholder for a long period. It also reduces the time spent in reassigning requests and reviews manually. See Governance delegates.
Group owner role is now Resource owner
The Group owner role has been renamed Resource owner.
Improved user experience for Access Requests
The access request details page and email notifications have been improved for better visibility on approvers' tasks and requesters' responses. If you integrated Slack with Access Requests, similar changes have been made to the access request message that approvers receive. Also, the request assignee has been removed from Slack and email notifications and the email notification sender's name and address have been changed. The sender's new name is Okta Access Requests and the new email address is noreply@at.okta.com. See Redesigned Approver Experience for Access Requests.
Security Access Reviews
Security Access Reviews are a new, security-focused type of user access review that can be automatically triggered by events. These reviews provide a unified view of a user's access, and contextual information about their access history including an AI-generated access summary, allowing you to investigate and take immediate remediation actions like revoking access. See Security access reviews.
Release 2025.08.4
Fixes
-
Sometimes entitlements assigned by policy were incorrectly included in user campaigns even if the campaign's resource scope was set to include only individually assigned entitlements. (OKTA-1001535)
-
The search results cleared when users refreshed the resource catalog on the End-User Dashboard after searching for an item. (OKTA-1006498)
-
When a reviewer attempted to retrieve a campaign that included a mix of self-review-enabled and -disabled campaigns, an error occurred and no campaigns were displayed. (OKTA-1012083)
Doc update
Changes to the existing Access Certification documentation
The existing Get started with Access Certifications topic and the Review campaigns topic section have been relocated to the Campaigns section.
Release 2025.08.2
Fixes
-
The number of pending review items displayed in the email notifications to the reviewers was incorrect. (OKTA-962525)
-
Some reviewers didn't receive email notifications when the campaign launched and reviews were assigned to them. (OKTA-994146)
Release 2025.08.1
Features and Enhancements
UI improvements for resource catalog tiles
The resource catalog tiles for request types and resource collections now include descriptions. For tiles with longer descriptions, you can hover over the text to view the full description in a tooltip.
Fixes
-
Sometimes admins could assign themselves as approvers for their own access requests. (OKTA-793993)
Release 2025.08.0
Features and Enhancements
Governance delegates
Super admins and users can assign another user as a delegate to complete governance tasks for them. Governance tasks include access certification campaign review items and access request approvals, questions, and other tasks. After a delegate is specified, all future governance tasks (access request approvals and access certification reviews) are assigned to the delegate instead of the original approver or reviewer. This helps ensure that governance processes don't stall when approvers are unavailable or tasks need to be rerouted to a different stakeholder for a long period. It also reduces the time spent in reassigning requests and reviews manually. See Governance delegates.
This is an Early Access release. See Enable self-service features.
Unified requester experience
Use this feature to create a consistent and unified experience for initiating requests in End-User Dashboard, Slack, and Microsoft Teams regardless of whether the request is managed by conditions or request types. This gives you the flexibility to use either or both methods together to manage resource access without altering the requester experience.
-
Request types now appear as tiles in the End-User Dashboard's resource catalog alongside other resources. Your settings for a request type's audience continue to govern which users can view the request type on their dashboard and request access.
-
In Slack and Microsoft Teams, users can now request access to resources that are governed by access request conditions, and the user experience for requesting resources that are managed by request types has also been changed.
Additionally, in the Okta Access Requests app, the Access requests page has been renamed to Resource catalog. Clicking it redirects requesters to the resource catalog on the End-User Dashboard. The Request types section in the web app is only visible to admins and team members who own the request type. See Create requests.
This is an Early Access release. See Enable self-service features.
Export Okta Identity Governance reports in PDF format
You can now export Okta Identity Governance reports to PDF. When exporting, you can also select specific columns to include in the report.
This is an Early Access release. See Enable self-service features.
Changes to request assignees for request types are available in Production environments
When a task or question in a request type is assigned to a group to complete, the user who originally submitted the request is now automatically excluded from the assignment, even if they are a member of that group. This prevents the requester from taking an action on their own request in a request management capacity.
Fixes
-
After a reviewer approved or revoked a review item, the value for the campaignItemRemediationStatus System Log event incorrectly displayed NONE. (OKTA-950851)
-
When an admin created or edited an entitlement bundle or policy, the entitlement Value dropdown list wasn't sorted by name properly. (OKTA-977656)
Release 2025.07.3
Fixes
-
Okta automatically assigned the last user to complete a task in the request as the request assignee. (OKTA-959802)
Release 2025.07.2
Features and Enhancements
New contextual information option
For Access Certification campaigns, the Employee number checkbox is now available in the Contextual Information section of the Settings page. See Customizable reviewer context.
Release 2025.07.1
Fixes
-
Sometimes, reviewers received errors when approving or revoking a user's access to a resource. (OKTA-917776)
Release 2025.07.0
Features and Enhancements
Okta Access Requests Resource Catalog app has been renamed
The Okta Access Requests Resource Catalog app has been renamed Okta Identity Governance. This app is automatically assigned to all users and no app management is required. Users may see the new name when they click Request access on the End-User Dashboard. This change doesn't impact the existing Okta Access Certification Reviews and Okta Access Requests apps that campaign reviewers and request approvers use.
Changes to access requests managed by request types are available in Production
If an access request is managed by request types, you can't use it to assign groups that grant Okta admin roles. You can't add groups that grant Okta admin roles to a list. Okta also invalidates request types that assign these groups when you create or edit the request type. Users get an error if they request a group that grants the Okta admin role. See Access Requests for admin roles.
Changes to Okta apps are available in Preview
You can no longer view or assign the following apps to users:
-
Okta Access Certifications
-
Okta Access Requests Admin
-
Okta Entitlement Management
Additionally, the sign-on policies for these apps will default to the existing sign-on policy that you use for the Okta Admin Console.
Fixes
-
Sometimes, the requester was assigned to approve their own access request if they were one of the group owners assigned to the approval. (OKTA-964674)
-
The Request Access button appeared on the End-User Dashboard even when there were no resources managed by access request conditions. (OKTA-972015)
Release 2025.06.2
Fixes
-
Some access request events weren't recorded in the System Log. (OKTA-955700)
Release 2025.06.1
Features and Enhancements
Changes to access requests managed by request types are now available in Preview environments
If an access request is managed by request types, you can't use it to assign groups that grant Okta admin roles. You can't add groups that grant Okta admin roles to a list. Okta also invalidates request types that assign these groups when you create or edit the request type. Users get an error if they request a group that grants the Okta admin role. See Access Requests for admin roles.
Changes to request assignees for request types are now available on Preview environments
When a task or question in a request type is assigned to a group to complete, the user who originally submitted the request is now automatically excluded from the assignment, even if they are a member of that group. This prevents the requester from taking an action on their own request in a request management capacity.
Fixes
-
Sometimes the Access Requests tab for a resource didn't load properly. (OKTA-941755)
-
Sometimes a user campaign failed to launch because the internal processing timed out. (OKTA-948673)
-
The Directories Integration API for AD Bidirectional Group Management returned a 500 error because of a null pointer exception. (OKTA-948743)
Release 2025.06.0
Fixes
-
If a user wasn't eligible to request any resources and clicked the Request access button on their dashboard, the message displayed to the user was unclear. (OKTA-931814)
-
User access granted by group rules wasn't revoked as expected when the access was revoked through an access certification campaign. (OKTA-934658)
-
Users were incorrectly removed from apps if admins ran Reevaluate Entitlements in the Admin Console before a scheduled policy job completed. (OKTA-939466)
Release 2025.05.3
Fixes
-
The UI text under the Request Types tab was outdated. (OKTA-929605)
-
Editing a draft Request Type that referenced a deleted configuration list resulted in an error. (OKTA-941618)
Release 2025.05.1
Features and Enhancements
New filter and columns for Access Certifications reports
You can use the Campaign ID filter in the Past campaign details and Past campaign summary reports. You can find a campaign's ID from System Log events or from the URL for the campaign details page.
Additionally, the following columns are available for use in the UI.
-
Past campaign details report:
- User email
- Reviewer email
- Reviewer reassigned
-
Past campaign summary report:
- Campaign resource count
See Past Campaign Details report and Past Campaign Summary report.
New System Log event
The access.request.expire event is logged when an access request expires. A request expires if there has been no activity in it for 60 days.
New variable for Access Certifications
Use the ${campaign.campaignDescription} variable to include a campaign's description when you customize email notifications. See Use VTL variables.
Release 2025.05.0
Features and Enhancements
Separation of duties is generally available in Production environments
Use Separation of duties (SOD) rules to define which combinations of entitlements create conflicts of interest in an org. Divide tasks and responsibilities using these rules so that the same user in an org doesn't have control over all aspects of a critical process. You can configure SOD rules to help reduce the risk of error, fraud, or unauthorized actions. With SOD rules, you can adopt a two-pronged approach to manage conflicting entitlement assignments – preventative and remediative.
-
Use Access Requests to specify whether users are allowed (or allowed with custom settings) or blocked from requesting access that can cause an SOD rule conflict. You can also run the Past Access Requests (Conditions) report to view access requests that have an SOD rule conflict using the Conflict name column.
-
Use Access Certifications to review and remediate existing user access if they have an SOD rule conflict by running a resource campaign.
In addition, SOD conflict information is also available when you run any of the Separation of duties, Past campaign details, or Past Access Requests (Conditions) reports.
See Resource collections, Configure settings for access requests, and Create resource campaigns.
User-friendly group display name and description is generally available in Production environments
Use the endUserDisplayName and endUserDisplayDescription group profile attributes to set a display name and description for an Okta group. After you set these, they are visible to requesters and approvers and provide context when they request or approve access. Okta automatically updates the group's display name and description (if available) on the End-User Dashboard twice daily. To make changes visible immediately on the End-User Dashboard, update a condition for an app that's assigned to the group. See Update group profile attributes .
Fixes
-
Okta didn't refresh the End-User Dashboard twice a day to remove app tiles for deleted or deactivated apps that had active access request conditions. (OKTA-896199)
Release 2025.04.1
Features and Enhancements
New look and feel in Access Requests is generally available in Production environments
The Access Requests console and Okta Access Requests web app now have a new look and feel, including redesigned side and top navigation menus and the addition of a gray background. Additionally, Dark mode is no longer available in the Access Requests.
Fixes
-
For groups that were used in access request conditions for admin role bundles, the maximum number of users allowed in a group was 100 instead of 200. (OKTA-859014)
Release 2025.04.0
Features and Enhancements
Separation of duties is generally available in Preview environments
Use Separation of duties (SOD) rules to define which combinations of entitlements create conflicts of interest in an org. Divide tasks and responsibilities using these rules so that the same user in an org doesn't have control over all aspects of a critical process. You can configure SOD rules to help reduce the risk of error, fraud, or unauthorized actions. With SOD rules, you can adopt a two-pronged approach to manage conflicting entitlement assignments – preventative and remediative.
-
Use Access Requests to specify whether users are allowed (or allowed with custom settings) or blocked from requesting access that can cause an SOD rule conflict. You can also run the Past Access Requests (Conditions) report to view access requests that have an SOD rule conflict using the Conflict name column.
-
Use Access Certifications to review and remediate existing user access if they have an SOD rule conflict by running a resource campaign.
See Resource collections, Configure settings for access requests, and Create resource campaigns.
User-friendly group display name and description is generally available in Preview environments
Use the endUserDisplayName and endUserDisplayDescription group profile attributes to set a display name and description for an Okta group. After you set these, they are visible to requesters and approvers and provide context when they request or approve access. See Update group profile attributes .
Visibility for Entitlement value description
The Entitlement value description option is now available in the Contextual Information section on the page. This option allows reviewers to view the description of an entitlement value for entitlements (including entitlements in a bundle) in the Review details panel for a review item. Additionally, admins and reviewers can also select the Entitlement value description option from the Customize view menu to add that as a column in their review table.
New look and feel in Access Requests is generally available in Preview environments
The Access Requests console and Okta Access Requests web app now have a new look and feel, including redesigned side and top navigation menus and the addition of a gray background. Additionally, Dark mode is no longer available in the Access Requests.
Fixes
-
Admins were unable to access the Resource Collections page in orgs whose authentication policy triggered a redirect flow. (OKTA-899711)
Release 2025.03.3
Fixes
-
When requesters submitted an access request from their dashboard, the Request submitted link appeared as text on the access level option unless the page was refreshed. (OKTA-882901)
-
The History section on the Review details panel for a review item only contained information about the reviewer decisions from the last campaign instead of the last two campaigns. Additionally, if the reviewer had left the item unreviewed, the information wasn't displayed. (OKTA-886196)
Release 2025.03.2
Fixes
-
When an admin edited entitlements, pages with more than 1000 values wouldn't load. (OKTA-891668)
Release 2025.03.1
Features and Enhancements
Changes to image previews in Access Requests message drafts
To enhance the security of your Access Requests files and messages, image previews have been removed from message drafts in the Access Requests console. You can view images after the message is sent in the chat.
Fixes
-
App tiles appeared in the app catalog on the End-User Dashboard if the app was deactivated before disabling the access request conditions associated with it. (OKTA-730057)
-
The Resources page of the campaign wizard displayed errors if you edited or duplicated a campaign that had a large number of entitlements or bundles. (OKTA-871758)
Release 2025.03.0
Features and Enhancements
Entitlement management for Microsoft Office 365
The Microsoft Office 365 app now supports entitlement management. See Apps with entitlement support.
New Access Certifications campaign
You can now run user campaigns to review users' admin role assignments. See Access Certifications for admin roles.
Fixes
-
The Microsoft Office 365 Government - GCC High app integration didn't have the correct metadata tags. (OKTA-509443)
-
Requesters couldn't extend the access duration if the requested access level was a group or entitlement bundle. (OKTA-859367)
-
Some pages in the Identity Governance section of the Admin Console, Access Certification Reviews app, and End-User Dashboard were unexpectedly translated to other languages. (OKTA-880031)
Release 2025.02.2
Fixes
-
Access requests admins couldn't edit the access request condition name for resource collections. (OKTA-834857)
-
Some information for deactivated user accounts was missing in the Past Access Requests (Conditions) report. (OKTA-852528)
Release 2025.02.0
Features and Enhancements
New look and feel in Access Certifications
In Access Certifications, the Access Certification Reviews app located on your dashboard now has a new look and feel, including a restyled top navigation bar and the addition of a gray background.
Request expiration and enhanced notifications for Access Requests is generally available in Production environments
To prevent accumulation of stale requests and improve the notification experience, Okta is making the following changes:
-
New requests now automatically expire after 60 consecutive days of inactivity. Completing a task, answering a question, or leaving a message on a request resets the 60-day expiration period. Any requests created before the general availability of this feature expire after 60 days of inactivity (on or around April 7, 2025).
-
Notifications about expiring requests are sent at 30 days, 5 days, and 1 day before the request expires.
-
The user setting to receive daily reminders about overdue tasks and requests is no longer available. It is replaced by the new request expiration notifications.
Resource collections
Resource collections allow you to create sets of apps and entitlements. These allow you to granularly define access to resources, which you can then grant to users based on their roles. See Resource collections
New System Log event
When the Request on behalf of setting is toggled on or off, the access.request.settings.update event is logged in the System Log. The event displays the details of the change including the name of the app for which the setting was updated, the previous and new state of the setting, and the user who made the change.
Modify condition names
Now you can modify the name of an access request condition that has a Disabled status from the options dropdown menu.
UI enhancement
The Security and & Sub-Processor Update dialog that appears the first time you create an access request condition for an app is now more user-friendly.
Fixes
-
Before a campaign with multiple review levels ended, some users saw notifications stating that there were review items pending past the review due date. (OKTA-857941)
Release notes retention policy
Okta maintains release notes online for a period of 12 months following a release.
Contact Okta Support to request archived documentation for releases outside this window.
