Skip to content

Commit 446fdd7

Browse files
OKTA-589028 - 2023.03.2 release notes (#4042)
* Make auth_time be a reserved claim both for access token and ID token * OKTA-589028 - Release note entries for 2023.03.2 (#4040) * Add rn entries for 2023.03.2 * Update Optional consent for OAuth ..to Production in March monthly --------- Co-authored-by: Frank Lu <[email protected]> Co-authored-by: franklu-okta <[email protected]>
1 parent c33f65d commit 446fdd7

File tree

3 files changed

+37
-16
lines changed

3 files changed

+37
-16
lines changed

packages/@okta/vuepress-site/docs/reference/token-hook/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,6 @@ Okta defines a number of reserved claims that can't be overridden. When you add
133133
| app_id | ID Token |
134134
| app_type | ID Token |
135135
| at_hash | ID Token |
136-
| auth_time | ID Token |
137136
| client_id | ID Token |
138137
| client_ip | ID Token |
139138
| client_req_id | ID Token |
@@ -177,6 +176,7 @@ Okta defines a number of reserved claims that can't be overridden. When you add
177176
| jti | Access Token & ID Token |
178177
| token_type | Access Token & ID Token |
179178
| ver | Access Token & ID Token |
179+
| auth_time | Access Token & ID Token |
180180

181181
### error
182182

packages/@okta/vuepress-site/docs/release-notes/2023-okta-identity-engine/index.md

Lines changed: 18 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,20 @@ title: Okta Identity Engine API Products release notes 2023
66

77
## March
88

9+
### Weekly release 2023.03.2
10+
11+
| Change | Expected in Preview Orgs |
12+
| ------ | ------------------------ |
13+
| [Bugs fixed in 2023.03.2](#bugs-fixed-in-2023-03-2) | March 22, 2023 |
14+
15+
#### Bugs fixed in 2023.03.2
16+
17+
* In some cases, groups with a `status` of INACTIVE were synchronized with the reporting database as ACTIVE. (OKTA-589084)
18+
19+
* Requests to the Policies API (`PUT /policies/${defaultIdpPolicy}/rules/${IdpRule}`) with an empty `userIdentifier` parameter returned an HTTP 500 Internal Server error. (OKTA-565856)
20+
21+
* Admins were able to modify the `auth_time` claim for an access token using a token inline hook. (OKTA-503099)
22+
923
### Weekly release 2023.03.1
1024

1125
| Change | Expected in Preview Orgs |
@@ -30,7 +44,7 @@ Using the Policy API, admins were able to set the `MFA_ENROLL` policy factor set
3044
| [OIDC Identity Providers private/public key pair support is GA](#oidc-identity-providers-private-public-key-pair-support-is-ga) |June 08, 2022 |
3145
| [API service integrations are GA in Preview](#api-service-integrations-are-ga-in-preview) |November 03, 2022 |
3246
| [Log Streaming is GA in Production](#log-streaming-is-ga-in-production) |March 30, 2022 |
33-
| [Optional consent for OAuth 2.0 scopes is GA in Prod](#optional-consent-for-oauth-2-0-scopes-is-ga-in-prod) |January 11, 2023 |
47+
| [Optional consent for OAuth 2.0 scopes is GA in Production](#optional-consent-for-oauth-2-0-scopes-is-ga-in-production) |January 11, 2023 |
3448
| [OAuth 2.0 authentication for inline hooks is GA in Preview](#oauth-2-0-authentication-for-inline-hooks-is-ga-in-preview) |October 05, 2023 |
3549
| [Transactional verification with CIBA is GA in Preview](#transactional-verification-with-ciba-is-ga-in-preview) |December 09, 2023 |
3650
| [Improvements to self-service account activities for AD and LDAP users](#improvements-to-self-service-account-activities-for-ad-and-ldap-users) |November 30, 2022 |
@@ -47,7 +61,7 @@ Rate limit violations mainly occur on authenticated endpoints. Currently, it isn
4761

4862
Authenticator enrollment provides a standardized way for a user to enroll a new authenticator using the OAuth `/authorize` endpoint. This feature uses query parameters such as prompt and `enroll_amr_values` to specify which authenticator the user wants to enroll. It also automatically verifies at least two factors as long the user has already enrolled two or more factors. <!--OKTA-544671-->
4963

50-
#### OIDC Identity Providers private/public key pair support is GA
64+
#### OIDC Identity Providers private/public key pair support is GA
5165

5266
Previously, Okta only supported the use of client secret as the client authentication method with an OpenID Connect-based Identity Provider. Okta now supports the use of private/public key pairs (`private_key_jwt`) with OpenID Connect-based Identity Providers. Additionally, the Signed Request Object now also supports the use of private/public key pairs. See [Create an Identity Provider in Okta](/docs/guides/add-an-external-idp/openidconnect/main/#custom-okta-hosted-sign-in-page). <!--OKTA-573913-->
5367

@@ -61,7 +75,7 @@ Many organizations use third-party systems to monitor, aggregate, and act on the
6175

6276
Log Streaming enables Okta admins to more easily and securely send System Log events to a specified systems, such as the Splunk Cloud or Amazon Eventbridge, in near real time with simple, pre-built connectors. Log streaming scales well even with high event volume, and unlike many existing System Log event collectors, it doesn't require a third-party system to store an Okta Admin API token. See [Log Streaming API](/docs/reference/api/log-streaming/). <!--OKTA-578532-->
6377

64-
#### Optional consent for OAuth 2.0 scopes is GA in Prod
78+
#### Optional consent for OAuth 2.0 scopes is GA in Production
6579

6680
OAuth 2.0 Optional consent provides an optional property that enables a user to opt in or out of an app's requested OAuth scopes. When optional is set to true for a scope, the user can skip consent for that scope. See [Request user consent](/docs/guides/request-user-consent/main/). <!--OKTA-581292-->
6781

@@ -85,13 +99,9 @@ CIBA extends OpenID Connect to define a decoupled flow where the authentication
8599

86100
Previously, the self-service unlock (SSU) and self-service password reset (SSPR) flows created unnecessary friction for AD and LDAP users. This feature enhancement introduces a seamless magic link experience in emails sent to unlock accounts and reset passwords. Users no longer need to provide consent when using the same browser. In addition, after successfully unlocking their account, clicking the email magic link counts towards the application's assurance policy. After the assurance requirements are met, the user is signed directly in to the application. These improvements are now GA in Preview. See [Customize email notifications](/docs/guides/custom-email/main/#use-vtl-variables). <!--OKTA-584526-->
87101

88-
89102
#### Honor force authentication support for SAML Apps API
90103

91-
Previously, the **Honor Force Authentication** parameter
92-
(`honorForceAuthn`) could only be set from the
93-
[SAML 2.0 App Integration Wizard](https://help.okta.com/okta_help.htm?type=oie&id=csh-apps-aiw-saml).
94-
When this property is set to `true`, users are prompted for their credentials when a SAML request has the `ForceAuthn` attribute set to `true`. You can now set this property for your SAML app without using the app integration wizard. See the [SAML 2.0 settings parameters in the Apps API](/docs/reference/api/apps/#add-saml-2-0-authentication-application). <!--OKTA-550077-->
104+
Previously, the **Honor Force Authentication** parameter (`honorForceAuthn`) could only be set from the [SAML 2.0 App Integration Wizard](https://help.okta.com/okta_help.htm?type=oie&id=csh-apps-aiw-saml). When this property is set to `true`, users are prompted for their credentials when a SAML request has the `ForceAuthn` attribute set to `true`. You can now set this property for your SAML app without using the app integration wizard. See the [SAML 2.0 settings parameters in the Apps API](/docs/reference/api/apps/#add-saml-2-0-authentication-application). <!--OKTA-550077-->
95105

96106
#### OIN Manager support for Workflow Connector submission is GA in Preview
97107

packages/@okta/vuepress-site/docs/release-notes/2023/index.md

Lines changed: 18 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,20 @@ title: Okta API Products release notes 2023
44

55
## March
66

7+
### Weekly release 2023.03.2
8+
9+
| Change | Expected in Preview Orgs |
10+
| ------ | ------------------------ |
11+
| [Bugs fixed in 2023.03.2](#bugs-fixed-in-2023-03-2) | March 22, 2023 |
12+
13+
#### Bugs fixed in 2023.03.2
14+
15+
* In some cases, groups with a `status` of INACTIVE were synchronized with the reporting database as ACTIVE. (OKTA-589084)
16+
17+
* Requests to the Policies API (`PUT /policies/${defaultIdpPolicy}/rules/${IdpRule}`) with an empty `userIdentifier` parameter returned an HTTP 500 Internal Server error. (OKTA-565856)
18+
19+
* Admins were able to modify the `auth_time` claim for an access token using a token inline hook. (OKTA-503099)
20+
721
### Weekly release 2023.03.1
822

923
| Change | Expected in Preview Orgs |
@@ -27,7 +41,7 @@ Using the Policy API, admins were able to set the `MFA_ENROLL` policy factor set
2741
| [OIDC Identity Providers private/public key pair support is GA](#oidc-identity-providers-private-public-key-pair-support-is-ga) |June 08, 2022 |
2842
| [API service integrations are GA in Preview](#api-service-integrations-are-ga-in-preview) |November 03, 2022 |
2943
| [Log Streaming is GA in Production](#log-streaming-is-ga-in-production) |March 30, 2022 |
30-
| [Optional consent for OAuth 2.0 scopes is GA in Prod](#optional-consent-for-oauth-2-0-scopes-is-ga-in-prod) |January 11, 2023 |
44+
| [Optional consent for OAuth 2.0 scopes is GA in Production](#optional-consent-for-oauth-2-0-scopes-is-ga-in-production) |January 11, 2023 |
3145
| [OAuth 2.0 authentication for inline hooks is GA in Preview](#oauth-2-0-authentication-for-inline-hooks-is-ga-in-preview) |October 05, 2022 |
3246
| [Honor force authentication support for SAML Apps API](#honor-force-authentication-support-for-saml-apps-api) |March 08, 2023 |
3347
| [OIN Manager support for Workflow Connector submission is GA in Preview](#oin-manager-support-for-workflow-connector-submission-is-ga-in-preview) |March 08, 2023 |
@@ -38,7 +52,7 @@ Using the Policy API, admins were able to set the `MFA_ENROLL` policy factor set
3852

3953
Rate limit violations mainly occur on authenticated endpoints. Currently, it isn't clear which OAuth 2.0 authenticated app consumes all the rate limits for an org. This increases the risk that one app consumes the entire rate limit bucket. To avoid this possibility, Okta admins can now configure how much rate limit capacity an individual OAuth 2.0 app can consume by editing the Application rate limits tab for each app. By setting a capacity on individual OAuth 2.0 apps, Okta admins have a new tool to monitor and investigate rate limit violations, and have the ability to view rate limit traffic generated by individual OAuth 2.0 apps. See [Rate limit dashboard bar graph](/docs/reference/rl-dashboard/#bar-graph). <!--OKTA-573387-->
4054

41-
#### OIDC Identity Providers private/public key pair support is GA
55+
#### OIDC Identity Providers private/public key pair support is GA
4256

4357
Previously, Okta only supported the use of client secret as the client authentication method with an OpenID Connect-based Identity Provider. Okta now supports the use of private/public key pairs (`private_key_jwt`) with OpenID Connect-based Identity Providers. Additionally, the Signed Request Object now also supports the use of private/public key pairs. See [Create an Identity Provider in Okta](/docs/guides/add-an-external-idp/openidconnect/main/#custom-okta-hosted-sign-in-page). <!--OKTA-573913-->
4458

@@ -52,7 +66,7 @@ Many organizations use third-party systems to monitor, aggregate, and act on the
5266

5367
Log Streaming enables Okta admins to more easily and securely send System Log events to a specified systems, such as the Splunk Cloud or Amazon Eventbridge, in near real time with simple, pre-built connectors. Log streaming scales well even with high event volume, and unlike many existing System Log event collectors, it doesn't require a third-party system to store an Okta Admin API token. See [Log Streaming API](/docs/reference/api/log-streaming/). <!--OKTA-578532-->
5468

55-
#### Optional consent for OAuth 2.0 scopes is GA in Prod
69+
#### Optional consent for OAuth 2.0 scopes is GA in Production
5670

5771
OAuth 2.0 Optional consent provides an optional property that enables a user to opt in or out of an app's requested OAuth scopes. When optional is set to true for a scope, the user can skip consent for that scope. See [Request user consent](/docs/guides/request-user-consent/main/). <!--OKTA-581292-->
5872

@@ -68,10 +82,7 @@ Using the OAuth 2.0 framework provides better security than Basic Authentication
6882

6983
#### Honor force authentication support for SAML Apps API
7084

71-
Previously, the **Honor Force Authentication** parameter
72-
(`honorForceAuthn`) could only be set from the
73-
[SAML 2.0 App Integration Wizard](https://help.okta.com/okta_help.htm?type=oie&id=csh-apps-aiw-saml).
74-
When this property is set to `true`, users are prompted for their credentials when a SAML request has the `ForceAuthn` attribute set to `true`. You can now set this property for your SAML app without using the app integration wizard. See the [SAML 2.0 settings parameters in the Apps API](/docs/reference/api/apps/#add-saml-2-0-authentication-application). <!--OKTA-550077-->
85+
Previously, the **Honor Force Authentication** parameter (`honorForceAuthn`) could only be set from the [SAML 2.0 App Integration Wizard](https://help.okta.com/okta_help.htm?type=oie&id=csh-apps-aiw-saml). When this property is set to `true`, users are prompted for their credentials when a SAML request has the `ForceAuthn` attribute set to `true`. You can now set this property for your SAML app without using the app integration wizard. See the [SAML 2.0 settings parameters in the Apps API](/docs/reference/api/apps/#add-saml-2-0-authentication-application). <!--OKTA-550077-->
7586

7687
#### OIN Manager support for Workflow Connector submission is GA in Preview
7788

0 commit comments

Comments
 (0)