You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Make auth_time be a reserved claim both for access token and ID token
* OKTA-589028 - Release note entries for 2023.03.2 (#4040)
* Add rn entries for 2023.03.2
* Update Optional consent for OAuth ..to Production in March monthly
---------
Co-authored-by: Frank Lu <[email protected]>
Co-authored-by: franklu-okta <[email protected]>
|[Bugs fixed in 2023.03.2](#bugs-fixed-in-2023-03-2)| March 22, 2023 |
14
+
15
+
#### Bugs fixed in 2023.03.2
16
+
17
+
* In some cases, groups with a `status` of INACTIVE were synchronized with the reporting database as ACTIVE. (OKTA-589084)
18
+
19
+
* Requests to the Policies API (`PUT /policies/${defaultIdpPolicy}/rules/${IdpRule}`) with an empty `userIdentifier` parameter returned an HTTP 500 Internal Server error. (OKTA-565856)
20
+
21
+
* Admins were able to modify the `auth_time` claim for an access token using a token inline hook. (OKTA-503099)
22
+
9
23
### Weekly release 2023.03.1
10
24
11
25
| Change | Expected in Preview Orgs |
@@ -30,7 +44,7 @@ Using the Policy API, admins were able to set the `MFA_ENROLL` policy factor set
30
44
|[OIDC Identity Providers private/public key pair support is GA](#oidc-identity-providers-private-public-key-pair-support-is-ga)|June 08, 2022 |
31
45
|[API service integrations are GA in Preview](#api-service-integrations-are-ga-in-preview)|November 03, 2022 |
32
46
|[Log Streaming is GA in Production](#log-streaming-is-ga-in-production)|March 30, 2022 |
33
-
|[Optional consent for OAuth 2.0 scopes is GA in Prod](#optional-consent-for-oauth-2-0-scopes-is-ga-in-prod)|January 11, 2023 |
47
+
|[Optional consent for OAuth 2.0 scopes is GA in Production](#optional-consent-for-oauth-2-0-scopes-is-ga-in-production)|January 11, 2023 |
34
48
|[OAuth 2.0 authentication for inline hooks is GA in Preview](#oauth-2-0-authentication-for-inline-hooks-is-ga-in-preview)|October 05, 2023 |
35
49
|[Transactional verification with CIBA is GA in Preview](#transactional-verification-with-ciba-is-ga-in-preview)|December 09, 2023 |
36
50
|[Improvements to self-service account activities for AD and LDAP users](#improvements-to-self-service-account-activities-for-ad-and-ldap-users)|November 30, 2022 |
@@ -47,7 +61,7 @@ Rate limit violations mainly occur on authenticated endpoints. Currently, it isn
47
61
48
62
Authenticator enrollment provides a standardized way for a user to enroll a new authenticator using the OAuth `/authorize` endpoint. This feature uses query parameters such as prompt and `enroll_amr_values` to specify which authenticator the user wants to enroll. It also automatically verifies at least two factors as long the user has already enrolled two or more factors. <!--OKTA-544671-->
49
63
50
-
#### OIDC Identity Providers private/public key pair support is GA
64
+
#### OIDC Identity Providers private/public key pair support is GA
51
65
52
66
Previously, Okta only supported the use of client secret as the client authentication method with an OpenID Connect-based Identity Provider. Okta now supports the use of private/public key pairs (`private_key_jwt`) with OpenID Connect-based Identity Providers. Additionally, the Signed Request Object now also supports the use of private/public key pairs. See [Create an Identity Provider in Okta](/docs/guides/add-an-external-idp/openidconnect/main/#custom-okta-hosted-sign-in-page). <!--OKTA-573913-->
53
67
@@ -61,7 +75,7 @@ Many organizations use third-party systems to monitor, aggregate, and act on the
61
75
62
76
Log Streaming enables Okta admins to more easily and securely send System Log events to a specified systems, such as the Splunk Cloud or Amazon Eventbridge, in near real time with simple, pre-built connectors. Log streaming scales well even with high event volume, and unlike many existing System Log event collectors, it doesn't require a third-party system to store an Okta Admin API token. See [Log Streaming API](/docs/reference/api/log-streaming/). <!--OKTA-578532-->
63
77
64
-
#### Optional consent for OAuth 2.0 scopes is GA in Prod
78
+
#### Optional consent for OAuth 2.0 scopes is GA in Production
65
79
66
80
OAuth 2.0 Optional consent provides an optional property that enables a user to opt in or out of an app's requested OAuth scopes. When optional is set to true for a scope, the user can skip consent for that scope. See [Request user consent](/docs/guides/request-user-consent/main/). <!--OKTA-581292-->
67
81
@@ -85,13 +99,9 @@ CIBA extends OpenID Connect to define a decoupled flow where the authentication
85
99
86
100
Previously, the self-service unlock (SSU) and self-service password reset (SSPR) flows created unnecessary friction for AD and LDAP users. This feature enhancement introduces a seamless magic link experience in emails sent to unlock accounts and reset passwords. Users no longer need to provide consent when using the same browser. In addition, after successfully unlocking their account, clicking the email magic link counts towards the application's assurance policy. After the assurance requirements are met, the user is signed directly in to the application. These improvements are now GA in Preview. See [Customize email notifications](/docs/guides/custom-email/main/#use-vtl-variables). <!--OKTA-584526-->
87
101
88
-
89
102
#### Honor force authentication support for SAML Apps API
90
103
91
-
Previously, the **Honor Force Authentication** parameter
When this property is set to `true`, users are prompted for their credentials when a SAML request has the `ForceAuthn` attribute set to `true`. You can now set this property for your SAML app without using the app integration wizard. See the [SAML 2.0 settings parameters in the Apps API](/docs/reference/api/apps/#add-saml-2-0-authentication-application). <!--OKTA-550077-->
104
+
Previously, the **Honor Force Authentication** parameter (`honorForceAuthn`) could only be set from the [SAML 2.0 App Integration Wizard](https://help.okta.com/okta_help.htm?type=oie&id=csh-apps-aiw-saml). When this property is set to `true`, users are prompted for their credentials when a SAML request has the `ForceAuthn` attribute set to `true`. You can now set this property for your SAML app without using the app integration wizard. See the [SAML 2.0 settings parameters in the Apps API](/docs/reference/api/apps/#add-saml-2-0-authentication-application). <!--OKTA-550077-->
95
105
96
106
#### OIN Manager support for Workflow Connector submission is GA in Preview
|[Bugs fixed in 2023.03.2](#bugs-fixed-in-2023-03-2)| March 22, 2023 |
12
+
13
+
#### Bugs fixed in 2023.03.2
14
+
15
+
* In some cases, groups with a `status` of INACTIVE were synchronized with the reporting database as ACTIVE. (OKTA-589084)
16
+
17
+
* Requests to the Policies API (`PUT /policies/${defaultIdpPolicy}/rules/${IdpRule}`) with an empty `userIdentifier` parameter returned an HTTP 500 Internal Server error. (OKTA-565856)
18
+
19
+
* Admins were able to modify the `auth_time` claim for an access token using a token inline hook. (OKTA-503099)
20
+
7
21
### Weekly release 2023.03.1
8
22
9
23
| Change | Expected in Preview Orgs |
@@ -27,7 +41,7 @@ Using the Policy API, admins were able to set the `MFA_ENROLL` policy factor set
27
41
|[OIDC Identity Providers private/public key pair support is GA](#oidc-identity-providers-private-public-key-pair-support-is-ga)|June 08, 2022 |
28
42
|[API service integrations are GA in Preview](#api-service-integrations-are-ga-in-preview)|November 03, 2022 |
29
43
|[Log Streaming is GA in Production](#log-streaming-is-ga-in-production)|March 30, 2022 |
30
-
|[Optional consent for OAuth 2.0 scopes is GA in Prod](#optional-consent-for-oauth-2-0-scopes-is-ga-in-prod)|January 11, 2023 |
44
+
|[Optional consent for OAuth 2.0 scopes is GA in Production](#optional-consent-for-oauth-2-0-scopes-is-ga-in-production)|January 11, 2023 |
31
45
|[OAuth 2.0 authentication for inline hooks is GA in Preview](#oauth-2-0-authentication-for-inline-hooks-is-ga-in-preview)|October 05, 2022 |
32
46
|[Honor force authentication support for SAML Apps API](#honor-force-authentication-support-for-saml-apps-api)|March 08, 2023 |
33
47
|[OIN Manager support for Workflow Connector submission is GA in Preview](#oin-manager-support-for-workflow-connector-submission-is-ga-in-preview)|March 08, 2023 |
@@ -38,7 +52,7 @@ Using the Policy API, admins were able to set the `MFA_ENROLL` policy factor set
38
52
39
53
Rate limit violations mainly occur on authenticated endpoints. Currently, it isn't clear which OAuth 2.0 authenticated app consumes all the rate limits for an org. This increases the risk that one app consumes the entire rate limit bucket. To avoid this possibility, Okta admins can now configure how much rate limit capacity an individual OAuth 2.0 app can consume by editing the Application rate limits tab for each app. By setting a capacity on individual OAuth 2.0 apps, Okta admins have a new tool to monitor and investigate rate limit violations, and have the ability to view rate limit traffic generated by individual OAuth 2.0 apps. See [Rate limit dashboard bar graph](/docs/reference/rl-dashboard/#bar-graph). <!--OKTA-573387-->
40
54
41
-
#### OIDC Identity Providers private/public key pair support is GA
55
+
#### OIDC Identity Providers private/public key pair support is GA
42
56
43
57
Previously, Okta only supported the use of client secret as the client authentication method with an OpenID Connect-based Identity Provider. Okta now supports the use of private/public key pairs (`private_key_jwt`) with OpenID Connect-based Identity Providers. Additionally, the Signed Request Object now also supports the use of private/public key pairs. See [Create an Identity Provider in Okta](/docs/guides/add-an-external-idp/openidconnect/main/#custom-okta-hosted-sign-in-page). <!--OKTA-573913-->
44
58
@@ -52,7 +66,7 @@ Many organizations use third-party systems to monitor, aggregate, and act on the
52
66
53
67
Log Streaming enables Okta admins to more easily and securely send System Log events to a specified systems, such as the Splunk Cloud or Amazon Eventbridge, in near real time with simple, pre-built connectors. Log streaming scales well even with high event volume, and unlike many existing System Log event collectors, it doesn't require a third-party system to store an Okta Admin API token. See [Log Streaming API](/docs/reference/api/log-streaming/). <!--OKTA-578532-->
54
68
55
-
#### Optional consent for OAuth 2.0 scopes is GA in Prod
69
+
#### Optional consent for OAuth 2.0 scopes is GA in Production
56
70
57
71
OAuth 2.0 Optional consent provides an optional property that enables a user to opt in or out of an app's requested OAuth scopes. When optional is set to true for a scope, the user can skip consent for that scope. See [Request user consent](/docs/guides/request-user-consent/main/). <!--OKTA-581292-->
58
72
@@ -68,10 +82,7 @@ Using the OAuth 2.0 framework provides better security than Basic Authentication
68
82
69
83
#### Honor force authentication support for SAML Apps API
70
84
71
-
Previously, the **Honor Force Authentication** parameter
When this property is set to `true`, users are prompted for their credentials when a SAML request has the `ForceAuthn` attribute set to `true`. You can now set this property for your SAML app without using the app integration wizard. See the [SAML 2.0 settings parameters in the Apps API](/docs/reference/api/apps/#add-saml-2-0-authentication-application). <!--OKTA-550077-->
85
+
Previously, the **Honor Force Authentication** parameter (`honorForceAuthn`) could only be set from the [SAML 2.0 App Integration Wizard](https://help.okta.com/okta_help.htm?type=oie&id=csh-apps-aiw-saml). When this property is set to `true`, users are prompted for their credentials when a SAML request has the `ForceAuthn` attribute set to `true`. You can now set this property for your SAML app without using the app integration wizard. See the [SAML 2.0 settings parameters in the Apps API](/docs/reference/api/apps/#add-saml-2-0-authentication-application). <!--OKTA-550077-->
75
86
76
87
#### OIN Manager support for Workflow Connector submission is GA in Preview
0 commit comments