Released in v1.0.586

Request configurations can now be configured to depend on the role being requested. For example, if a user is requesting an admin/high-privilege role, you can set up more stringent approval requirements compared to a read-only role.

This is available for all Opal integrations including GitHub, GitLab, and GCP.

Available in v1.0.586

Fixes a bug where two GCP compute/sql instances given the same name (but in different projects) would not be able to both be imported into Opal.

Available in v1.0.565

We now support attaching request configurations to multiple groups without duplicating the configuration. If a user is in any of the listed groups, that configuration will be used (according to priority).

Available in v1.0.566

GCP Organizations can now be imported (see docs), allowing users to track and grant organization level roles/users.

Users need to update Opal's service account permissions to include

  • resourcemanager.organizations.get
  • resourcemanager.organizations.getIamPolicy
  • resourcemanager.organizations.setIamPolicy

Available in v1.0.563

Opal's resource "access levels" were renamed to "roles" for clarity and better alignment with our integrations such as GCP, Github, Gitlab etc.

This change does not yet impact APIs

Available in v1.0.561

  1. Fixed incorrect resources and groups showing up under a reviewer's Items to Review.
  2. Fixed incorrect status displayed for some groups under Items to Review.