Okta Privileged Access Platform release notes
Learn about new features, enhancements, and fixes in the latest version of the Platform release.
See the Okta Support website for the list of supported operating systems with End of Life (EOL) dates.
Current release
Version: 2026.02.2
Deployment date: February 25, 2026
Release summary
The following releases are now in Preview:
New password management options for on-premises SaaS app accounts
Admins can now configure password rotation for managed on-premises app accounts that require a current password to rotate. This enhancement also allows authorized users to manually override stored passwords in Okta Privileged Access to resolve out-of-sync credentials. See Change rotation strategy for SaaS apps.
New System Log event for password rotation changes
A new System Log event has been added to track changes to the password rotation strategy for apps connected to Okta Privileged Access. You can use this event to track configuration changes that impact the management of credentials for connected app accounts.
The following releases are now in Production:
Longer account checkout durations
Security admins can now set the maximum checkout time for accounts to seven days. This update is available in both project settings and policy rule overrides. See Enable checkout.
Server Account reveal password configuration
Security admins can now set up security policies with reveal password privilege for server account rules. End users under that security policy can reveal the password when the server account is available or checked out by the end user. See Configure secret rule.
Previous releases
Version: 2026.02.1
Deployment date: February 19, 2026
Release summary
The following releases are now in Preview:
Server Account reveal password configuration
Security admins can now set up security policies with reveal password privilege for server account rules. End users under that security policy can reveal the password when the server account is available or checked out by the end user. See Configure secret rule.
The following releases are now in Production:
Predefined secret templates for Privileged Access
New secret templates in Okta Privileged Access allow users to quickly create common secret types, such as API keys and passwords, using predefined fields. This enhancement simplifies the secret creation process by eliminating the need to manually configure key-value pairs. See Create a secret.
Version: 2026.02.0
Deployment date: February 05, 2026
Release summary
The following releases are now in Preview:
Predefined secret templates for Privileged Access
New secret templates in Okta Privileged Access allow users to quickly create common secret types, such as API keys and passwords, using predefined fields. This enhancement simplifies the secret creation process by eliminating the need to manually configure key-value pairs. See Create a secret.
The following releases are now in Production:
Password rotation for SaaS app and Okta service accounts
Admins can now enable automatic password rotation for SaaS apps and Okta service accounts within their security policies. This feature allows for immediate rotation upon resource assignment or the flexibility to skip the initial rotation. See Security policy.
Automatic logging out for Okta Privileged Access sessions
Logging out of a Okta Privileged Access session now automatically ends the corresponding Okta session.
Version: 2026.01.0
Deployment date: January 21, 2026
Release summary
The following releases are now in Preview:
Password rotation for SaaS app and Okta service accounts
Admins can now enable automatic password rotation for SaaS apps and Okta service accounts within their security policies. This feature allows for immediate rotation upon resource assignment or the flexibility to skip the initial rotation. See Security policy.
Version: 2025.12.0
Deployment date: December 16, 2025
Release summary
Okta Privileged Access supports thirty new SaaS apps
Okta Privileged Access now supports thirty new SaaS apps, including ServiceNow, Jira server, SAP, and Palo Alto Networks. See Supported SaaS apps.
New local group management options for AD accounts
Okta Privileged Access policy rules now provide granular control over the local group membership of Active Directory (AD) accounts on target hosts. Admins can configure the policy to grant or revoke local admin rights, or select a Do Nothing option to prevent Okta Privileged Access from modifying any local groups. See Add rules to a policy.
Version: 2025.10.2
Deployment date: October 22, 2025
Release summary
The following releases are now in Production:
Session recording for Active Directory accounts
You can enable session recording through the Okta Privileged Access gateway using an Active Directory account rule. See Add rules to a policy.
Version: 2025.10.0
Deployment date: October 08, 2025
Release summary
The following releases are now in Production:
Exclude symbols in project password policy
Password complexity settings for servers, SaaS app service accounts, Okta service accounts, and Active Directory accounts have been updated. You can now exclude specific symbols from Okta Privileged Accesspasswords, preventing rotation failures in systems that restrict certain symbols. See Projects.
Auto-generate passwords for SaaS apps
Okta Privileged Access users can now use the password generator feature to update the password for their unmanaged SaaS apps. See Okta Privileged Access user guide.
Version: 2025.9.1
Deployment date: September 19, 2025
Release summary
The following releases are now in Preview:
Auto-generate passwords for SaaS apps is EA
Okta Privileged Access users can now use the password generator feature to update the password for their unmanaged SaaS apps. See Okta Privileged Access user guide.
The following releases are now in Production:
Okta-managed Active Directory accounts is EA
You can now set up Active Directory (AD) account rules to import users managed by Okta. Enabling an AD account allows active users to sign in to Okta and access their SSO apps through the End-User Dashboard. Admins and users can rotate passwords via Okta Privileged Access, with synchronization occurring between the AD server and Okta. You can also filter account names or Okta group memberships when configuring AD account rules with user management capabilities enabled. See Active Directory account rules.
Version: 2025.9.0
Deployment date: September 08, 2025
Release summary
The following releases are now in Preview:
Okta-managed Active Directory accounts is EA
You can now set up Active Directory (AD) account rules to import users managed by Okta. Enabling an AD account allows active users to sign in to Okta and access their SSO apps through the End-User Dashboard. Admins and users can rotate passwords via Okta Privileged Access, with synchronization occurring between the AD server and Okta. You can also filter account names or Okta group memberships when configuring AD account rules with user management capabilities enabled. See Active Directory account rules.
Version: 2025.08.3
Deployment date: August 27, 2025
Release summary
The following releases are now in Production:
Active Directory Remote Desktop Protocol (RDP) support is EA
This EA feature enables security admins to grant RDP access to Windows servers with Active Directory credentials. Once provisioned, users can connect through the Okta Privileged Access client. Security admins can configure MFA, approval requests, or checkout processes. Gateways aren't currently supported for RDP connections using Active Directory credentials. See Active Directory account rules.
Version: 2025.08.2
Deployment date: August 21, 2025
Release summary
The following releases are now in Preview:
Active Directory Remote Desktop Protocol (RDP) support is EA
This EA feature enables security admins to grant RDP access to Windows servers with Active Directory credentials. Once provisioned, users can connect through the Okta Privileged Access client. Security admins can configure MFA, approval requests, or checkout processes. Gateways aren't currently supported for RDP connections using Active Directory credentials. See Active Directory account rules.
Version: 2025.08.1
Deployment date: August 13, 2025
Release summary
The following releases are now in Production:
Active Directory rotate password configuration
This EA feature enhances flexibility for Okta Privileged Access admins and users in managing password rotation. Resource admins can disable initial password rotation for discovered Active Directory (AD) accounts. Security admins can set policies that grant end users the ability to rotate their passwords. See Active Directory account rules.
Version: 2025.08.0
Deployment date: August 13, 2025
Release summary
The following releases are now in Preview:
Active Directory rotate password configuration
This EA feature enhances flexibility for Okta Privileged Access admins and users in managing password rotation. Resource admins can disable initial password rotation for discovered Active Directory (AD) accounts. Security admins can set policies that grant end users the ability to rotate their passwords. See Active Directory account rules.
The following releases are now in Production:
Search capability for Okta Privileged Access secrets
Okta Privileged Access users can now search secret folders and secrets. See Add rules to a policy.
Version: 2025.06.0
Deployment date: June 04, 2025
Release summary
The following releases are now in Production:
-
You can now schedule the password rotation frequency for all projects up to a maximum of 400 days.
Version: 2025.05.3
Deployment date: April 29, 2025
Release summary
The following releases are now in Production:
-
Cloud infrastructure entitlements feature is no longer supported in Okta Privileged Access.
Version: 2025.04.2
Deployment date: April 10, 2025
Release summary
The following releases are now in Production:
-
If users failed to meet the MFA requirement for Okta Privileged Access and enrollment was disabled, clicking the Okta Privileged Access tile incorrectly redirected them to the team creation screen.
Version: 2025.04.0
Deployment date: April 02, 2025
Release summary
The following releases are now in Production:
Manage Active Directory accounts in Okta Privileged Access
This feature allows management of Active Directory (AD) account passwords through Okta Privileged Access using the Okta AD agent. Okta Privileged Access admins can set discovery rules for accounts in specific organizational units (OUs) and create policies for user access, ensuring passwords are rotated upon check-in or on a schedule. Users with access can view their assigned accounts and retrieve passwords. To enable this feature, contact Okta Support. See Manage Active Directory accounts.
Version: 2025.03.1
Deployment date: March 26, 2025
Release summary
The following releases are now in Preview:
Manage Active Directory accounts in Okta Privileged Access
This feature allows management of Active Directory (AD) account passwords through Okta Privileged Access using the Okta AD agent. Okta Privileged Access admins can set discovery rules for accounts in specific organizational units (OUs) and create policies for user access, ensuring passwords are rotated upon check-in or on a schedule. Users with access can view their assigned accounts and retrieve passwords. To enable this feature, contact Okta Support. See Manage Active Directory accounts.
Version: 2025.03.0
Deployment date: March 12, 2025
Release summary
The following releases are now in Production:
-
Password rotation history is now supported in SaaS and Okta accounts.
Version: 2025.02.3
Deployment date: February 26, 2025
Release summary
The following releases are now in Production:
-
The Okta Privileged Access policy now supports the MFA conditional for SaaS and Okta accounts.
Version: 2025.02.0
Deployment date: February 19, 2025
Release summary
The following releases are now in Production:
- Fixes
- An unused team setting related to SCIM usernames has been deprecated
Release notes retention policy
Okta maintains release notes online for a period of 12 months following a release.
Contact Okta Support to request archived documentation for releases outside this window.
