Okta Preview Sandbox – Release 2017.05 Skip to main content
How satisfied are you with the Okta Help Center?
Thank you for your feedback!
How satisfied are you with the Okta Help Center?
Very Dissatisfied
Very satisfied
Enter content less than 200 characters.
Okta Preview Sandbox – Release 2017.05
Published: Feb 1, 2017   -   Updated: Jun 22, 2018

Okta Preview Release 2017.05 began deployment on February 1. For the latest information on our release schedule, see Current Release Status.

Check the version number at the bottom of your Okta Administrator page to see your current version. Clicking the version number takes you directly to the folder containing the release notes.

User-added image

Version numbers usually indicate the year and week of the year when releases are pushed to orgs. For example, release 2017.02 was pushed the second week of 2017. The week numbers follow the ISO Week Date convention. 

Special Announcements

EOL for Okta support of Apple mobile OS version

With the releases of Okta Mobile 5.2.0 and Okta Verify 3.2.0, Okta no longer supports iOS 8. Users attempting new installations on iOS 8 will see a notice stating that their OS version is no longer supported. Currently, Okta supports iOS versions 9.x and 10.x. For details, see Okta Support for Mobile Operating System Versions.

Browser plugin phased rollout

On February 20, 2017, Okta will begin a phased Generally Available (GA) release of Okta browser plugin version 5.11.x for all supported browsers. The rollout is targeted to end on March 7, 2017. This version provides security enhancements. Okta strongly recommends that you install the plugin when prompted to do so. If you have any questions or concerns following the upgrade, contact Okta Support. For version history, see Browser Plugin Version History.

New Okta Sign-In Experience to be enabled for all remaining Production orgs

On February 15, 2017 Okta will enable the New Okta Sign-In Experience automatically for those remaining Production orgs that have not enabled it yet. If you have not done so already, we recommend that you enable the feature now to let your users become familiar with it. If you have any questions, please contact Okta Support.

Apple iOS 10 upgrade impact on Okta Mobility Management Password Sync

Users who have upgraded to iOS 10 should note the following: If you’re using Okta Mobility Management (OMM) to configure Exchange ActiveSync (EAS) profiles, a known issue has been introduced that affects OMM’s ability to perform Password Sync for EAS profile updates on iOS devices. For details and workarounds, see Known Issue: iOS10 upgrade impacts Okta Mobility Management (OMM) Password Sync.

What's New

Unless otherwise noted, this feature is available to all Preview orgs with release 2017.05:

  • If Okta fails to process an IWA token, you can now redirect end users to a custom error page. This option is useful if you embed Okta into your solution and want to control end-to-end branding to enhance end user experience. For more information, see Login Error Page.

    User-added image

    This is an Early Access (EA) feature; contact Okta Support to enable it.

  • As with Domain local and Global groups, you can now push Universal groups to Active Directory.

    User-added image

  • When creating a new OpenID Connect app and configuring an Implicit grant type, you can now specify whether to include ID Tokens, Access Tokens, or both. 

    User-added image

  • Per SAML standards, we now send Universal Directory (UD) array attributes in SAML 1.1 assertions as multi attribute values.

  • We have enhanced our System Log to now include more granular Microsoft Office 365 events.

Agent Update

The Okta Radius Server agent version 2.5.0 is now available to EA users. This release supports the Radius Generic App and Amazon Workspace App. To obtain this EA release, contact Okta Support. For the version history, see Okta RADIUS Server Agent Version History.

Platform Release Notes

Changes to the platform for this release are published in the Platform Release Notes on http://developer.okta.com.

Incremental Features Summary

There are no incremental features in this release.

Application Updates

We've implemented SWA for the following Okta Verified applications:

  • Adjust (OKTA-113618)

  • Apple MyAccess (OKTA-113555)

  • Awesome Screenshot

  • Framer Cloud (OKTA-113964)

  • Google Partner Dash

  • Google Tag Manager

  • WestNet Learning (OKTA-114255)

We've implemented SAML for the following Okta Verified applications:

  • Honest Buildings (OKTA-112673)

  • LiveRamp Connect (OKTA-113207)

  • MetricStream (OKTA-111284)

  • Qminder (OKTA-112438)

We've added the following Mobile application for use with Okta Mobility Management (OMM):

  • Cornerstone OnDemand (OKTA-114007)


We've changed Signature/Digest algorithms from SHA1 to SHA256 for the following SAML apps:

  • AbsorbLMS (OKTA-114002)

  • BSwift (OKTA-113982)

  • Changepoint (OKTA-114004)

  • Cisco Spark Platform

  • Corcentric COR360 (OKTA-113989)

  • Eloqua (OKTA-113985)

  • LeanKit (OKTA-114001)

  • Novatus (OKTA-113963)

  • Qvidian (OKTA-113995)

  • SAP NetWeaver (OKTA-113987)

  • Selectica (OKTA-113997)

  • Whitehat Security (OKTA-113977)

Bug Fixes

Bug numbers ending with an H are hotfixes. Hotfixes are typically deployed after the initial release.

Product Bug Fixes

The following issues are fixed:

  • OKTA-59054 – A non-operational button to globally expire passwords was displayed in error.
  • OKTA-84474 – For end users required to provide MFA, the IWA background image failed to appear during sign on.
  • OKTA-89842 – Users were shown a menu option for which they did not have permissions and received an error page.
  • OKTA-93556 – An empty email field failed to display the appropriate error message.
  • OKTA-106902 – Following an AD Import, the Employment Status and Job Information fields were not mapped in BambooHR.
  • OKTA-107388 – In app attribute settings, the Group Priority option Combine values across groups reverted to Use Group Priority after provisioning settings were changed.
  • OKTA-108093 – Microsoft Office 365 failed to push null values for the Description in a Distribution List or Security Group.
  • OKTA-110090 – Workday-mastered, imported end-users were intermittently arrested in an activating status.
  • OKTA-111110 – An empty Reports section on the Admin Dashboard was displayed inadvertently.
  • OKTA-111322 – Group Pushes to Slack failed.
  • OKTA-111391 – End-users were prompted for MFA more often than the specified, app-specific sign on policy rule.
  • OKTA-113873 – Okta SMS failed to re-send an authentication code during MFA enrollment.
  • OKTA-114245 – Requesting the SAML ACS endpoint by URL failed for some existing apps.
  • OKTA-111614 – System Log queries containing the '{' character failed.

App Integrations Fixes

The following SWA apps were not working correctly and are now fixed:

  • Becker CPA Exam Review

  • Club OS (OKTA-113777)

  • DataSafe (OKTA-113471)

  • Engage (OKTA-113764)

  • FlightStats (OKTA-113795)

  • IFTTT (OKTA-113794)

  • IMDB Pro (OKTA-113491)

  • ROI Solutions (OKTA-113762)

  • Site5 (OKTA-113790)

  • Stack Overflow Careers

  • StatusCake (OKTA-114162)

  • TriCare (OKTA-113402)