Okta Production – Release 2015.48 Skip to main content
https://support.okta.com/help/oktaarticledetailpage?childcateg=&id=ka0f00000005ra0kai&source=documentation&refurl=http%3a%2f%2fsupport.okta.com%2fhelp%2fdocumentation%2fknowledge_article%2fokta-production-release-2015-48
How satisfied are you with the Okta Help Center?
Thank you for your feedback!
How satisfied are you with the Okta Help Center?
1
2
3
4
5
Very Dissatisfied
Very satisfied
Enter content less than 200 characters.
Okta Production – Release 2015.48
Published: Dec 1, 2015   -   Updated: Jun 22, 2018

Okta Preview Sandbox (oktapreview.com) features from 2015.47 and 2015.48 have been combined and pushed to Production (okta.com). This deployment begins on November 30. For the latest information on our release schedule, see Current Release Status.

Check the version number at the bottom of your Okta Administrator page to see your current version. Clicking the version number takes you directly to the folder containing the release notes.

User-added image

New Features

  • Okta is excited to introduce a suite of robust enhancements for Universal Directory!

    • Attribute-level Mastering (ALM) delivers fine-grain control over how profiles are mastered, allowing you to specify different profile masters for individual attributes. You can even allow end-users to edit specific attributes from their Settings / Account page. For more information, see Attribute Level Mastering.
    • Union of Group Assignments takes advantage of group prioritization and the attributes they contain. For users belonging to multiple groups, their attributes can either be combined from string array values across groups, or set to honor the highest priority group. For more information, see Union of Group Assignments in Universal Directory

Both these enhancements are Early Access (EA) features; contact Okta Support to enable them.

  • We are happy to introduce our enhanced Active Directory (AD) integration that combines the best features of Okta's existing Classic Imports and Federated Profiles options. The new integration simplifies our AD offering by providing the following: 
    • Flexibility to sync users and groups via scheduled imports, JIT, or both.
    • Support for importing Universal Security Groups.
    • Separate Group and User OU selectors allow more granular imports from specific OUs.
    • Imports now reflect changes to OU topology.
    • Admins can choose to import only groups and OUs without importing user accounts.

    For more information, see About Okta's Enhanced Active Directory Integration. This Early Access (EA) feature requires the Okta Active Directory Agent version 3.3.5 or later. To obtain the agent and enable enhancements, contact Okta Support. You must uninstall any pre-3.3.5 versions of the agent before installing version 3.3.5. For more information, see Installing and Configuring the Active Directory Agent.

  • We are pleased to announce that support for the KoreanSwedish, and Thai languages for the end user experience is now available to all customers in Beta format. You can now select these languages as the default language preference for your entire org. As always, your end users can choose their own language preference for their experience. The end user's preference overrides the org language preference. For more information, see Setting Language PreferencesNote: This Beta feature requires the Okta browser plugin version 5.2.2 or later. To provide feedback, send an email to beta@okta.com.
  • The Okta Mobile PIN expiration setting now includes the options 1 week and 2 weeks.

    To specify when a Mobile PIN expires, select Security > General, then scroll down to the Okta Mobile section:

    User-added image

  • Have you made use of the safeguard against large app unassignments during imports? This Beta feature has been enhanced! Now, admins have a new level of control when using this option. In addition to displaying an error message when the system detects a high number of app unassignments, the feature now allows you to choose to continue the import process. If you haven’t used this feature yet, please contact Okta Support for implementation.

    User-added image

  • The UsageLocation attribute is now mappable for integrations with Microsoft Office 365. For more information, see Okta Enhancements with Microsoft Office 365 Integration.

Okta Developer Platform Update

Documentation for the Okta Developer Platform is available at http://developer.okta.com.

  • The Groups API now supports membership change dates. There are three new attributes available: created, lastUpdated, and lastMembershipUpdated. You can filter by lastUpdate and lastMembershipUpdated.

Feature Summary

The following table summarizes new features and features that are enabled incrementally. Links in the Feature column point to additional documentation for that feature, if available. After the feature is fully released, it is no longer tracked in this table. For past release history, see Features by Release.

FeaturePreview
New Orgs
Production
New Orgs
Preview
Existing Orgs
Production
Existing Orgs
Group-based Sign On Policies2015.482015.48
Provision Okta Default UserName to BlueJeans App2015.482015.502015.482015.50
UD Enhancements (Attribute-Level Mastering and Union of Group Assignments (EA)2015.482015.482015.482015.48
Enhanced Active Directory Integration (EA)2015.482015.482015.482015.48
Additional End User Language Support2015.472015.472015.472015.47
New Okta Mobile PIN Expiration Settings Options2015.472015.472015.472015.47
Additional Office 365 Attribute2015.472015.472015.472015.47
Import Safeguards Enhancement2015.472015.47
Enhanced Automatic App Login (Plugin)2015.462015.46
Inbound SAML with UD2015.452015.45
(11/9-11/10)
2015.47
(11/18-11/19)
2015.48
(12/2-12/3)

Agent Updates

  • The EA release of the Java LDAP Agent version 5.3.0 is now available. This release provides the following enhancements:
    • In supported versions of LDAP, end users can change and reset their LDAP passwords in Okta. For more information, see Configuring Your LDAP Password Reset Settings.
    • Allows Okta’s On-Premises Provisioning agent and Okta Java LDAP agent to be installed on the same machine.
    • Fixed an issue that prevented LDAP imports from working correctly with Active Directory Lightweight Directory Services.

    To obtain this release and enable password features, contact Okta Support. You must uninstall any pre-5.3.0 versions of the agent before installing version 5.3.0. For version history, see Java LDAP Agent Version History.

  • The EA release of the Okta Active Directory version 3.3.5 is now available. This release supports enhanced AD integration (see New Features above). For details about agent version history, see Active Directory Agent Version History.

Browser Plugin Updates

  • Okta announces the General Availability (GA) of plugin version 5.5.0 for the ChromeFirefox, and Safari browsers. Version 5.5.0 is also available for Internet Explorer to EA users. This release adds support for the following:
    • Full Okta rebranding, including new Okta logos and graphical elements
    • Several internal IE-specific improvements

    For details, see Browser Plugin Version History.

Browser Support

On December 11, 2015, Okta will discontinue support for Microsoft® Internet Explorer 7 (IE7), as well as all versions of Compatibility View that represent IE7. After that date, Okta Customer Support will no longer investigate issues related to IE7. For more information about supported browsers, see Platforms Browser and OS Support.

Applications

Provisioning

You can now provision the default Okta UserName to the BlueJeans app.

Integrations

We've implemented SAML for the following Okta Verified applications:

  • Buildkite (OKTA-73542)

  • BullseyeEngagement (OKTA-72826)

  • Chartio SAML (OKTA-74062)

  • Domo (OKTA-73256)

  • Dynamic Signal (OKTA-70572)

  • IgniteCast (OKTA-70821)

  • Looker (OKTA-71308)

  • myPolicies (OKTA-70193)

  • Org2Org (OKTA-69847)
  • Qstream (OKTA-73273)

  • RiskAnalytics (OKTA-64943)

  • Shiftboard SAML (OKTA-72858)

  • TestFairy (OKTA-73289)

We've implemented SWA for the following Okta Verified applications:

  • ABBYY Online (OKTA-71892)

  • ACTi Connecting Vision (OKTA-73214)

  • AdMob (OKTA-72325)

  • Ally Auto(Login) (OKTA-73823)

  • Ally Bank Login (OKTA-71896)

  • AWR Cloud (OKTA-74396)

  • Brand Integrity (OKTA-73210)

  • Breeze (OKTA-73562)

  • Call-Em-All (OKTA-71897)

  • Captora (OKTA-71891)

  • Careerlink Job Seeker (OKTA-71898)

  • CB Insights (OKTA-73667)

  • Cloudyn (OKTA-71901)

  • CloverETL (Forum) (OKTA-73212)

  • CoderPad (OKTA-74104)

  • Couchbase (OKTA-71902)

  • CounselorLibrary (OKTA-74106)

  • CrystalKnows (OKTA-74385)

  • Dailymotion (OKTA-73748)

  • Delta Dental NJ (OKTA-71894)

  • DesignCrowd (OKTA-72322)

  • Factual (OKTA-71903)

  • Float (OKTA-74102)

  • GBES (OKTA-71888)

  • Genymotion (OKTA-74388)

  • geocod.io (OKTA-74419)

  • GlobalData (OKTA-73824)

  • Golden Frog (OKTA-74383)

  • Grainger (OKTA-73215)

  • Hubdoc (OKTA-72321)

  • Impraise (OKTA-74097)

  • Infragistics (OKTA-74384)

  • Jitterbit (OKTA-73664)

  • KISSFlow (OKTA-74423)

  • Korea Technology and Communications
    (KT&C USA) (OKTA-73827)

  • LeanSentry (OKTA-71887)

  • LKQD Platform (OKTA-71886)

  • LOREX (OKTA-73750)

  • Mashery (Developer) (OKTA-71915)

  • Mashery (Support) (OKTA-71916)

  • Melissa Data (OKTA-71904)

  • MongoDB Cloud Manager (OKTA-71900)

  • MySophos Login (OKTA-74093)

  • NetRoadshow (OKTA-73860)

  • NodePing (OKTA-74460)

  • NPM (OKTA-71899)

  • Omnis Network (OKTA-74110)

  • Opinion Stage (OKTA-72320)

  • Oracle iExpense (OKTA-72368)

  • Oufittery (EN) (OKTA-72323)

  • OxBlue (OKTA-71889)

  • PersistIQ (OKTA-71893)

  • Rally Congress (OKTA-74105)

  • SecureSheet (OKTA-73826)

  • Sequoia (Benefits Portal for
    Sequoiatech) (OKTA-73744)

  • Sigstr (OKTA-74468)

  • SiliconExpert Technologies (OKTA-74386)

  • Speednames (OKTA-71895)

  • Staples (OKTA-71462)

  • Steam Community (OKTA-71890)

  • SumAll (OKTA-73825)

  • Switch (OKTA-73742)

  • Udacity (OKTA-74312)

  • WeWork (OKTA-74109)

  • WhatCounts Publicaster
    Edition (OKTA-73763)

  • Whispir (OKTA-74103)

  • YOTPO (OKTA-73219)

  • YP.com (OKTA-73220)

Bug Fixes

Bug numbers ending with an H are hotfixes. Hotfixes are generally deployed after the initial release.

  • OKTA-57259 – Fixed an issue in which all Microsoft Office 365 chiclets redirected to the Calendar app. 
  • OKTA-59562 – Enhanced our default Universal Directory (UD) profile/mapping template.
  • OKTA-62834 – Implemented API rate limits to fix an issue pushing new users for the DocuSign app.
  • OKTA-63459 – Enhanced security by verifying that sensitive information is not included in system logs.
  • OKTA-65237 – Fixed an issue in the JIRA app in which groups did not appear for users.
  • OKTA-67118 – Improved event logging by logging events when users enter their pin in Okta Mobile.
  • OKTA-68536 – Fixed an issue in which changed attributes were incorrectly logged following Microsoft Office 365 profile template migration.
  • OKTA-68670 – Fixed an issue that prevented installing the OPP agent when the latest Java LDAP agent was installed on the same machine.
  • OKTA-69773 – Improved DirSync exclusion functionality for users, groups, and contacts.
  • OKTA-71326 – Fixed an issue with Windows Internet Explorer 11 that sometimes caused the Okta plugin to fail.
  • OKTA-71767 – Fixed an issue with the Netsuite app that caused the Profile Master feature to fail.
  • OKTA-72744 – Fixed an issue in which the display for the Reset Multifactor option showed two instances of Okta Verify when only one existed.
  • OKTA-73591 – FWe have increased the length of the Description field in existing Microsoft Active Directory profile templates to 1024 characters to fix an issue confirming imported users with a long Description.
  • OKTA-73668 – Fixed an issue pushing a group to Google Apps that was previously deleted in Google Apps.
  • OKTA-73821 – Fixed an issue with next link handling for GitHub and GitHub Enterprise to correctly handle pagination for when more than 30 objects are returned from the server.
  • OKTA-74585 – Fixed an issue in which users with a valid two-factor authentication token received an error when adding an SMS phone number if SMS self service was turned on.

The following SWA apps were not working correctly and are now fixed:

  • Axiom Travel (OKTA-73012)

  • Citrix Receiver (OKTA-72365)

  • Citrix XenApp (OKTA-73914)

  • Connected Backup - Support
    Center (OKTA-73441)

  • DiscoverOrg (OKTA-73443)

  • Edmodo (OKTA-73917)

  • Indianapolis Business Journal (OKTA-73919)

  • Marketo (OKTA-72382)

  • Microsoft SharePoint Online
    Office 365 (OKTA-72357)

  • Migration Wiz (OKTA-73662)

  • MyRegence (OKTA-73440)

  • RecruiterBox (OKTA-73855)

  • SAP BusinessObjects (OKTA-65598)

  • Sharepoint Online (OKTA-72354)

  • Snaplogic Dashboard (OKTA-73918)

  • Teamsupport (OKTA-73438)

  • United Airlines (OKTA-73223)

  • US Messenger (OKTA-73439)

  • USPS (OKTA-72316)

  • Wells Fargo (Commercial
    Electronic Office) (OKTA-74133)

  • Yahoo Mail (OKTA-72390)

The following SAML apps were not working correctly and are now fixed:

  • Benetrac (OKTA-60230)

  • Luno (OKTA-73277)