Okta Production – Release 2015.18 Skip to main content
https://support.okta.com/help/oktaarticledetailpage?childcateg=&id=ka0f0000000u3ldka0&source=documentation&refurl=http%3a%2f%2fsupport.okta.com%2fhelp%2fdocumentation%2fknowledge_article%2fokta-release-2015-18
How satisfied are you with the Okta Help Center?
Thank you for your feedback!
How satisfied are you with the Okta Help Center?
1
2
3
4
5
Very Dissatisfied
Very satisfied
Enter content less than 200 characters.
Okta Production – Release 2015.18
Published: Apr 28, 2015   -   Updated: Jun 22, 2018

Features from 2015.17 and 2015.18 have been combined and deployed to Okta Production on May 4. For the latest information on our release schedule, see Current Release Status.

Check the version number at the bottom of your Okta Administrator page to see your current version. Clicking the version number takes you directly to the folder containing the release notes

User-added image

New Features

  • We've made it easier to access the System Log page. As always, you can review your logs from the Reports page, but now you can also access the logs from a System Log tab within the Reports menu. For more information,  see the System Log section in Using the Okta Reports Page.
    User-added image

  • Okta has added a feature to the Workday integration. Admins can now deactivate Okta users based on the date of their last day of work, not their termination date. For additional details on this new feature, see Configuring Provisioning for Workday.

  • We are pleased to announce that Okta now provides an option for admins to allow their users to authenticate mobile devices via Integrated Windows Authentication (IWA). For more information about installing and configuring Okta IWA, see Configuring Desktop SSO.

    Important: Only use this advanced feature if you have deployed a Mobile Device Management (MDM) solution to enable IWA for your mobile and tablet devices.

  • Okta is pleased to announce that we have upgraded functionality for our SSO Edition Okta admins who use Amazon Web Services (AWS). Previously only available to Enterprise Edition admins, the ability to assign multiple roles for AWS users during importation is now also available to SSO Edition admins. For more details on AWS configuration, see How to Configure SAML 2.0 for AWS.

Agent Updates

Okta announces the Early Availability (EA) of the Java LDAP Agent version 1.2.5. This update includes improved registration error messages. For more information, see Java LDAP Agent Version History.

Plugin Updates

We are pleased to announce that plugin version 5.1.5 is released to General Availability for Internet Explorer, Firefox, and Safari browsers. We are releasing this update in phases to orgs. The update enables developer logging, supports German and Japanese localization, and includes various bug fixes.

Application Integrations

Provisioning is now enabled for 7Geese.

We've implemented SAML for the following Community Created applications:

  • Avature (OKTA-54943)

  • Jenkins SAML (OKTA-56696)

  • Navex Global - Policy Tech (OKTA-54387)

  • RingCentral (OKTA-53701)

  • Serraview (OKTA-55428)

  • Workforce Software (OKTA-54386)

 

We've implemented SAML for the following Okta Verified applications:

  • Hoshinplan (OKTA-56727)

  • i GET IT (OKTA-54693)

  • OpenDNS (OKTA-56072)

  • SmartRecruiters (OKTA-56220)

 

We've implemented SWA for the following Okta Verified applications:

  • AdExtent (OKTA-56715)

  • Alberta Blue Cross - Plan members
    (OKTA-56981)

  • Alberta Secure Access Svc (OKTA-56992)

  • Bomgar Self Service Center (OKTA-56869)

  • Briotix Training (OKTA-56855)

  • BroadStripes CRM (OKTA-57067)

  • Business.com (OKTA-57097)

  • Cedexis (OKTA-57026)

  • Churn Buster (OKTA-56832)

  • Codility (OKTA-56948)

  • Consumer Reports (OKTA-55360)

  • Costco Whosale (OKTA-55569)

  • Cox (OKTA-56973)

  • Cox Business (OKTA-56975)

  • Dataprise Client Mgmt Sys. (OKTA-57080)

  • Double Robotics (OKTA-56718)

  • DreamsTime (OKTA-57094)

  • EAT Club (OKTA-56721)

  • EventBoard (OKTA-56958)

  • Eviction Assistant (OKTA-54308)

  • Exponent HR (OKTA-57033)

  • Fundbox (OKTA-56712)

  • GE Capital (OKTA-52378)

  • GovConnection (OKTA-55873)

  • HotSchedules (OKTA-56731)

  • INetU - Client Center Login (OKTA-57002)

  • iRepo (OKTA-43205)

  • Lumara Health Promotional Ordering
    (OKTA-57069)

  • Macys (OKTA-56949)

  • MacysNet (OKTA-56950)

  • MindTickle - Admin (OKTA-57078)

  • Mint Bills (OKTA-55137)

  • NCIX Canada (OKTA-56888)

  • Patient Access (OKTA-55834)

  • PetroSkills Compass (OKTA-57005)

  • Pulse360 (OKTA-56843)

  • Questionmark (OKTA-57008)

  • Raygun (OKTA-56837)

  • Saleshood (OKTA-56951)

  • Service Management Group (OKTA-56826)

  • ShiftNote (OKTA-56829)

  • SiteUptime (OKTA-56724)

  • Sumdog School Login (OKTA-55460)

  • Taboola (OKTA-56726)

  • The Advisory Board (OKTA-56860)

  • Top500Guide (OKTA-56959)

  • Transpack (OKTA-57070)

  • Typography Hoefler and Co (OKTA-56839)

  • Waste Management (OKTA-56158)

  • Yanomo (OKTA-57076)

  • ZenPayroll (OKTA-56841)

  • Zillow (OKTA-55762)

Bug Fixes 

  • OKTA-43306 – We have enhanced the configuration process for the Federated ID app. There are now only two integration steps, instead of five.
  • OKTA-50361 – Fixed an issue in which Inbound SAML users were incorrectly prompted for a password when changing their MFA profile.
  • OKTA-52017 – We now support use of the @ symbol in custom application usernames for the OutSystems app.
  • OKTA-55388 – Fixed an issue where users were unable to add the app for OfficeSpace Software using our preconfigured SAML integration (OAN).
  • OKTA-55490 – Fixed an issue where leaving the Password field blank prevented users from adding the ServiceNow app. 
  • OKTA-55916 – Fixed an issue within Universal Directory where Netsuite provisioning was incorrectly mapping mobile attributes.
  • OKTA-56048 – Fixed an issue where enabling an OMM policy turned off the fingerprint lock function on Android devices. 
  • OKTA-56413 – Fixed an issue in which Multifactor Authentication (MFA) using RSA was failing when some users tried to log in to their org from Netscaler through the Okta Radius server.

The following SWA apps were not working correctly and are now fixed:

    • Apple Community (OKTA-56298)

    • Dropbox (OKTA-24588)

    • Halogen (OKTA-56651)

    • HR BLOCK (OKTA-55652)

    • Instagram (OKTA-56065)

    • MyRegence (OKTA-54921)

    • Panorama9 (OKTA-56864)

    • PinnacleCart Administrator Login (OKTA-54321)

    • Standout M (OKTA-55994)

    • TheLadders (OKTA-55198)

    • Western Union (OKTA-55737)

    • Wunderlist (OKTA-56392)