February release notes draft

✨ Enhancements

See indirect access paths across AWS, Active Directory, and Google Workspace

Permissions views now display indirect access across AWS, Active Directory, and Google Workspace, including access granted through nested groups, intermediary roles, or other inherited relationships. This ensures the permissions graph, entitlement views, and access reviews reflect effective access, not just direct assignments, giving admins a more accurate picture of who can access what across these integrations.

Permissions graph showing indirect access
ℹ️

For information about the permissions graph, see The permissions graph.

Experience consistent access controls across Entitle workflows

Access controls are now handled more consistently across approval workflows, the permissions graph, org settings, users, tasks, and audit logs. This makes it easier to understand and control who can access what throughout Entitle, with the same permission types interpreted and displayed consistently across screens.

ℹ️

For more information, see:

Get clearer, threaded Slack notifications for approval workflows

Slack approval notifications are now consolidated into a single thread per access request, making it easier to follow the full decision history. Channels acting as approvers or notifiers receive clearer updates that show who approved a request, when it was approved, and how it progressed, improving visibility and auditability directly within Slack.

ℹ️

For more information, see Approval workflows.

Track Okta admin role changes through webhook events

The Okta integration webhook now supports additional events related to admin role changes. These include assignment and removal of predefined admin roles, as well as creation and deletion of custom admin role assignments through resource sets. This ensures changes to Okta administrative privileges are captured and processed more completely within Entitle.

ℹ️

For more information, see Okta webhooks.

Search and filter more efficiently across Bulk Actions and Birthright policies

Bulk Actions now supports search across integrations, resources, roles, workflows, owners, maintainers, IdP groups, and users, making it easier to target the correct items before applying updates. The Birthright Policies page also includes search and filtering, helping admins quickly locate and manage policies in larger or more complex environments.

Filter bulk actions
ℹ️

For more information, see Birthright policies.

Connect Jamf to Entitle without disabling SSO

The Jamf integration now supports environments where SSO is enabled, using modern authentication flows instead of relying solely on basic authentication. Customers can connect Jamf to Entitle without disabling SSO, while maintaining their existing identity and security controls.

Add Jamf Pro integration with OAuth 2.0 client credentials
ℹ️

For more information, see Jamf Pro.

See only managed resources and roles when configuring virtual applications

The virtual integration resource and role picker now displays only managed resources and roles. By excluding unmanaged items and integrations without managed resources, the selection experience is cleaner and reduces the risk of misconfiguration.

While adding a role, "All the roles in this resource are unmanaged"
ℹ️

For more information, see Integrations, resources, and roles.

See improved accuracy and usability in the JIT request analysis report

The JIT request analysis report has been enhanced to improve data accuracy and usability, and to better align with how Entitle represents user entitlements and access relationships. The report now more reliably reflects current roles, resources, and effective access, giving stakeholders greater confidence when using it for operational monitoring and compliance reviews.

ℹ️

For information about this report, see View JIT request analysis.

Discover available Entitle applications programmatically

Terraform users can now retrieve the list of Entitle applications directly through the provider, eliminating the need for hard-coded values when defining integrations. This allows infrastructure teams to discover applications programmatically and incorporate them into automation workflows with greater confidence.

ℹ️

For more information about Terraform, see Terraform Cloud.

Manage virtual applications more reliably with Terraform

Infrastructure supporting a virtual application is now managed through Terraform, enabling consistent and repeatable provisioning across environments. Managing these resources as infrastructure as code reduces configuration drift and makes future updates safer and easier to audit.

ℹ️

For more information about Terraform, see Terraform Cloud.

See consistent bundles, policies, and tags behavior across screens

Bundles, policies, and tags now behave consistently across configuration screens. These updates make entitlement configuration more predictable and easier to manage, especially in large or complex tenants.

Experience more reliable and understandable handling of complex access scenarios

Several enhancements were made to improve how Entitle models and processes complex access scenarios across integrations. These updates increase the reliability of permission handling and improve how effective access is calculated and displayed, reducing the need for manual corrections and making access behavior easier to understand.

📑 Documentation

Get clearer guidance when using Entitle public APIs

Entitle’s public API documentation has been expanded to provide clearer guidance on required and optional parameters, expected value formats, and edge cases. The updates also clarify how to obtain referenced IDs and how virtual or manual applications behave in different scenarios, making integrations smoother for API and Terraform users.

ℹ️

To see the updated documentation, see the API reference.


©2003-2026 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.