Deprecated RESOURCES_ADDED_TO_GROUPS, GROUP_RESOURCES_UPDATED, and RESOURCES_REMOVED_FROM_GROUPS events and migrated them to ROLE_ASSIGNMENT_CREATED, ROLE_ASSIGNMENTS_UPDATED, and ROLE_ASSIGNMENTS_DELETED, respectively
Added search query to URL for user group, user resources, resource groups, resource roles, and group users tables
Updated styling of request duration dropdown
Updated styling of the group access tab of a group
Fixed access review metrics to correctly count only users specified in filters when generating reports for User Access Reviews.
Added an access level column to a user resource and user group tables
Updated terminology for inventory apps + bundles to contain "assets" (resources and groups)
Added requested by for all requests requested by someone else
Added opal_org_name name field to event streaming payload.
Added the ability to filter resources by ancestor in the GetResources API. This allows users to retrieve all resources that are descendants of a specified resource, making it easier to navigate hierarchical resource structures.
Fixed links from slack, emails, and google chat directing to broken pages
Fixed a bug where “Create Access Review Date” input could have the wrong dates
Fixed a bug where when adding resources to a group, an apps resources list would not expand.
Fixed a bug causing usage data to show as "Not Available" incorrectly for certain groups.
Fixed a bug where users resources page wasn't paginated
Fixed a bug where propagation tickets may not have displayed correctly
Fixed a bug where loading approved requests with a propagation ticket may have failed
Updated request form label from Expires In to How long do you need access?
Opal can now automatically revoke access from users in end systems when they are deprovisioned in IDP/HRIS systems. This can be enabled in IDP/HRIS settings.
Added max possible duration option when creating an API Access Token
Fixed missing My Access toggle in app detail view in Catalog
The "Connect" button for AWS Identity Center Roles now directly links to an AWS session using the role in question rather than the AWS Identity Center start page.
Improved API request validation to properly handle all requests with bodies. This fixes an issue creating and modifying terraform resources using apis with no request body.
Added the ability to update a user's access level or duration in a group via the API.
Fixed a bug when setting a custom duration for an Owner Escalation Policy would default to an invalid '0' option.
Fixed a bug where some custom connector login events were not attributed to their resource.
AWS, Azure and GCP apps now default to list view in the UI.