Okta Production – Release 2015.45 Skip to main content
How satisfied are you with the Okta Help Center?
Thank you for your feedback!
How satisfied are you with the Okta Help Center?
Very Dissatisfied
Very satisfied
Enter content less than 200 characters.
Okta Production – Release 2015.45
Published: Nov 10, 2015   -   Updated: Jun 22, 2018

Okta Production Release 2015.45 began deployment on Nov 9. For the latest information on our release schedule, see Current Release Status.

Check the version number at the bottom of your Okta Administrator page to see your current version. Clicking the version number takes you directly to the folder containing the release notes.

User-added image

New Features

  • We are pleased to announce the Early Access (EA) release of the Okta Sign-In Widget, a full-featured, customizable login experience that can be used to authenticate on any web site.

    User-added image

    Key benefits:

    • Complete authentication support
    • MFA user flows
    • Self-service password reset
    • Password expiration notifications
    • User input validation and error handling

    To enable this EA feature, contact Okta Support. For more information, see the Okta Sign-In Widget article.

  • Okta's Inbound SAML with Universal Directory (UD) options is now General Availability (GA). Highlights include:
    • Inbound SAML is now built on UD. Leveraging UD's ability to store multiple attributes, incoming assertions can now feed richer profile attributes to UD.
    • You can now define any number of identity providers and define an unlimited number of attributes for each provider with UD. You are no longer limited to the first name, last name, email, and phone number attributes.
    • Okta Inbound SAML now supports configurable signature algorithm requirements and configurable clock skew.

    For more information, see Configuring Inbound SAML with Universal Directory Options.

  • Okta now supports VPN Profile Provisioning. Okta Mobility Management (OMM) can now provision VPN configurations directly to devices, without requiring IT to duplicate infrastructures or implement application proxies and gateways. This feature is available for iOS devices. This is an EA feature; contact Okta Support to enable it. See Configuring VPN Profiles for details.
  • We’ve added new functionality to our Universal Directory (UD) integration with SAManage. Admins can now choose whether they Import active users only. Our UD integration with SAManage is an Early Access feature; contact Okta Support to enable it.
  • We are pleased to announce that Public Groups and Feature Licenses support for Salesforce provisioning is now Generally Available (GA).

    User-added image

  • Our support for SAML SSO for Chrome OS devices is now Generally Available. This support allows admins to use Okta to manage passwords that are stored on Chrome OS devices. For more information, see Configuring SAML Single Sign-On for Chrome OS Devices

Feature Summary

The following table summarizes new features and features that are enabled incrementally. Links in the Feature column point to additional documentation for that feature, if available. After the feature is fully released, it is no longer tracked in this table. For past release history, see Features by Release.

New Orgs
New Orgs
Existing Orgs
Existing Orgs
Widget (EA)2015.452015.452015.452015.45
VPN Profile Provisioning (EA)2015.452015.452015.452015.45
Enhanced UD Integration with SAManage (EA)2015.452015.452015.452015.45
Inbound SAML with UD2015.452015.45

Public Groups and Feature Licenses for Salesforce provisioning (GA)

SAML SSO for Chrome OS2015.442015.452015.442015.45

Plugin Updates

  • We have improved how the Okta browser plugin recognizes the login fields of apps that users navigate to directly, without going through the Okta Dashboard. The enhanced plugin allows users to log in to more apps automatically, without requiring them to enter their credentials. This is an EA feature; contact Okta Support to enable it.
  • We have updated the plugin for Internet Explorer and Safari browsers to version 5.3.9 for EA users. This version includes several internal improvements. For details, see the Browser Plugin Version History.

Browser Support

On December 11, 2015, Okta will discontinue support for Microsoft® Internet Explorer 7 (IE7), as well as all versions of Compatibility View that represent IE7. After that date, Okta Customer Support will no longer investigate issues related to IE7. For more information about supported browsers, see Platforms Browser and OS Support.



We've implemented Provisioning for the Slack app.


We've implemented SAML for the following Okta Verified applications:

  • Desk.com (OKTA-66975)

  • Kaseya (OKTA-67679)

  • Luno (OKTA-71283)

  • TOPdesk (OKTA-67807)

We've implemented SWA for the following Okta Verified applications:

  • Alliance Residential (OKTA-72332)

  • ASIC (OKTA-67808)

  • Aviso (OKTA-72342)

  • Bank of America (OKTA-72348)

  • Citibank (OKTA-72352)

  • Citrix NetScaler Gateway (OKTA-72349)

  • Datto Partner Portal (OKTA-72344)

  • GovConnection (OKTA-72346)

  • Identity Guard (OKTA-72343)

  • MindTickle - Admin (OKTA-72351)

  • MySonicWall (OKTA-72353)

  • Netsimplicity Meeting
    Manager (OKTA-72328)

  • Pando (OKTA-71919)

  • PlanGrid (OKTA-72341)

  • Projector PSA (OKTA-72326)

  • Remedy IT Service Management

  • SouthWest (OKTA-72337)

  • Trello (OKTA-72340)

  • WebstaurantStore (OKTA-72010)

  • Weibo Microblogging (OKTA-70092)

We've added the following Mobile application for use with Okta Mobility Management (OMM):

  • ServiceNow - Eureka and later releases (OKTA-71260)


Bug Fixes

Bug numbers ending with an H are hotfixes. Hotfixes are generally deployed after the initial release.

  • OKTA-42718 – Fixed an issue that prevented users from accessing the SAP BusinessObjects app.
  • OKTA-68799 – Fixed an issue in which the Pick Schema Attributes window failed to appear when clicking the Add Attributes button in the Zendesk app Profile Editor settings.
  • OKTA-69678 – Fixed an issue in which setting per-app MFA assignments resulted in inconsistent prompts and time settings.
  • OKTA-69770 – Fixed an issue in which Workday failed to profile push a rehired user's information to Okta/Active Directory.
  • OKTA-70349 – Fixed an issue in which changes to LDAP import matching rules were not saved.
  • OKTA-70559 – Fixed an issue that prevented sending email notifications about LDAP agent disconnect/reconnect events.
  • OKTA-71445 – Fixed an issue where the Okta Change password form failed to display in the browser as expected when an end user began to change the password of an integrated app.
  • OKTA-72773 – We fixed some minor icon and label alignment issues on the Devices page for OMM.

The following SWA apps were not working correctly and are now fixed:

  • Adjust (OKTA-72370)

  • Ahrefs Link Manager (OKTA-72380)

  • AT&T Business Direct (OKTA-72432)

  • Bank of America - Works (OKTA-72425)

  • Bitbucket (OKTA-72366)

  • DoubleClick For Publishers (OKTA-72363)

  • Google Accounts Personal (OKTA-72359)

  • HelloSign and HelloFax (OKTA-72375)

  • Hilton Hotels (OKTA-72427)

  • HostAnalytics (OKTA-72373)

  • JSTOR (OKTA-72393)

  • LastPass (OKTA-72329)

  • Monster (OKTA-72428)

  • MOVEit DMZ (OKTA-72381)

  • Norton Online Backup (OKTA-72403)

  • PlanSource Benefits (OKTA-72400)

  • TASC Admin Service (OKTA-72429)

The following SAML apps were not working correctly and are now fixed:

  • BullseyeEngagement (OKTA-72388)

  • Ustream Align (OKTA-67954)