Okta Production – Release 2015.46 Skip to main content
How satisfied are you with the Okta Help Center?
Thank you for your feedback!
How satisfied are you with the Okta Help Center?
Very Dissatisfied
Very satisfied
Enter content less than 200 characters.
Okta Production – Release 2015.46
Published: Nov 17, 2015   -   Updated: Jun 22, 2018

Okta Production Release 2015.46 began deployment on November 16. For the latest information on our release schedule, see Current Release Status.

Check the version number at the bottom of your Okta Administrator page to see your current version. Clicking the version number takes you directly to the folder containing the release notes.

User-added image

New Features

  • Okta is pleased to introduce another popular, leading-edge authentication option! YubiKey is a multifactor authentication device that delivers a unique password every time it’s activated. End users simply press on the YubiKey hard token in the USB port to securely log into their accounts. Security is assured, as all YubiKey validation occurs within the Okta Cloud. For more information, see Using YubiKey AuthenticationThis is an Early Access (EA) feature; contact Okta Support to enable it.
  • Okta is also introducing a new feature for our Active Directory-mastered group password policy users. Working in conjunction with AD, the Softlock feature provides a new way to prevent end-user lockouts. This option also prevents a malicious third party from using Okta to lock up an end user. For details, see Configuring Group Password PoliciesThis is an EA feature; contact Okta Support to enable it.
  • We now allow admins to display a warning message in the browser when an Okta user attempts to log in to an unknown org. This security feature prompts end users to use caution before they enter their login credentials for an org that is not their primary org. This feature is Generally Available (GA). For more information, see Using the Okta Settings Page.

    User-added image

  • Consistent with our support for other SAML apps, we now support custom app login URLs for Google Apps. This function allows you to redirect unauthenticated users to a custom login page when they attempt to access a Google application. For more information, see Redirecting Users to a Custom Login Page.

Feature Summary

The following table summarizes new features and features that are enabled incrementally. Links in the Feature column point to additional documentation for that feature, if available. After the feature is fully released, it is no longer tracked in this table. For past release history, see Features by Release.

New Orgs
New Orgs
Existing Orgs
Existing Orgs
YubiKey Support (EA)2015.462015.462015.462015.46
Softlock for Group Password Policy Users (EA)2015.462015.462015.462015.46
Unknown Org Security Warning2015.462015.462015.462015.46
Custom App Login URLs for Google Apps2015.462015.462015.462015.46
Enhanced Automatic App Login (Plugin)2015.462015.46
Inbound SAML with UD2015.452015.45

Public Groups and Feature Licenses for Salesforce provisioning (GA)

SAML SSO for Chrome OS2015.442015.452015.442015.45

Plugin Update

We have improved how the Okta browser plugin recognizes the login fields of apps that users navigate to directly, without going through the Okta Dashboard. The enhanced plugin allows users to log in to more apps automatically, without requiring them to enter their credentials. This feature does not require a plugin update. This feature is GA and is enabled incrementally as shown in the Features Summary table above. 

Browser Support

On December 11, 2015, Okta will discontinue support for Microsoft® Internet Explorer 7 (IE7), as well as all versions of Compatibility View that represent IE7. After that date, Okta Customer Support will no longer investigate issues related to IE7. For more information about supported browsers, see Platforms Browser and OS Support.



We've implemented provisioning for the Rally app. 


We've implemented SAML for the following Okta Verified applications:

  • Assembla (OKTA-66971)

  • Droplr (OKTA-71791)

  • Kaseya (OKTA-67679)

  • Salsify (OKTA-72881)

We've implemented SWA for the following Okta Verified applications:

  • Google AdWords (OKTA-72330)

  • Microsoft Dynamics CRM Online

  • Microsoft E-Learning (OKTA-72334)

  • Playhaven (OKTA-71884)

Bug Fixes

Bug numbers ending with an H are hotfixes. Hotfixes are generally deployed after the initial release.

  • OKTA-71609 – Fixed an issue that caused Concur provisioning to fail when creating new users.
  • OKTA-72852 – Fixed an issue where the aggregation numbers for mobile devices were not displayed on the Devices overview page.

The following SWA apps were not working correctly and are now fixed:

  • ADP eTIME (OKTA-72398)

  • Air France (OKTA-73017)

  • Backupify (OKTA-73007)

  • Citi Private Bank (OKTA-73016)

  • CloudForge (OKTA-72392)

  • Cradlepoint Enterprise Cloud
    Manager (OKTA-73020)

  • DART Sales Manager (OKTA-72424)

  • DevExpress (OKTA-72394)

  • Enterprise (OKTA-73006)

  • GE my.FleetOffice (OKTA-73018)

  • IBM Kenexa Prove It!

  • LoopUp (OKTA-72399)

  • Mirasvit (OKTA-73014)

  • OpenX (OKTA-73021)

  • Oracle Human Capital Management

  • Quickbooks (OKTA-72645)

  • RedHat Portal Login (OKTA-73019)

  • Tracker (OKTA-73022)

  • Verizon Wireless (OKTA-73008)

  • Wells Fargo (Commercial Electronic
    Office) (OKTA-72364)