Updated the Import Roles sidebar for a more streamlined role import experience.
Fixed an issue where Slack requesters and approvers needed to sign in to Opal before completing OIDC MFA validation with their identity provider. Users can now complete MFA validation directly from Slack without requiring an active Opal session.
[On-Premises Deployments] This update includes a database migration involving events that may take extended time to complete. We recommend scheduling this update during off-hours to minimize impact.
Added masking to the Tailscale API Key input during setup screen for enhanced security.
Added support for importing array user attributes as user tags from Okta. A user tag will be created for every value in the array, enabling more flexible access rules based on manager and department hierarchies.
Added a menu to end user detail cards with options to copy the asset link and asset ID.
Improved Google Groups integration to function with reduced permissions - now only requires admin.directory.group.readonly scope instead of admin.directory.group.
Improved Google Workspace integration to function with reduced permissions - now only requires admin.directory.rolemanagement.readonly scope instead of admin.directory.rolemanagement.
Improved display of long description text for better readability.
Improved access expiration notifications to display the full resource path, providing clearer context.
Improved error messages for the remote resources API to provide better troubleshooting information.
Fixed an issue preventing users from creating configuration templates with global visibility in Terraform.
Fixed users with GROUP:EDIT_ASSIGNMENTS permission being unable to edit Access Rule conditions.
Fixed an issue with Active Directory connections for users with empty email attributes.
Fixed a synchronization issue where service accounts deleted in GCP were not being removed from Opal.
Fixed bug on Owners group escalation policy where opening the edit form would not reflect the current state of the policy when on
Added custom Opal Roles, allowing Opal admins to create and edit Opal roles with fine-grained permissions. For detailed instructions and examples, please see the Custom Opal Roles documentation page.