What's new in this release
For additional releases, see the full list of Identity Security Insights release notes.
New features
Just-in-time default access
Administrators no longer have to manually assign permissions when adding a new user. Instead, administrators can configure default access rules for single sign-on applications. When new users log in via an identity provider, they'll immediately have access to the site or application they need.
For more information, see Identity providers.
Enhancements
More insights from connectors
Keys that need updating
The Azure connector script now includes the Key Vault Reader role on Management Groups. This role reads metadata of vaults and their certificates, keys, and secrets. It does not permit access to sensitive values, such as secret contents or key material.
Behavior detection rules
The Okta connector now collects data on behavior detection rules. This helps us understand how conditions like city, device, and access velocity trigger additional authentication in Okta's sign-on policies.
Inactive users
The Password Safe connector now collects data on inactive users. This helps enrich our data sets, provide more accurate information, and ensure no inactive users have access.
Link to connector report
A connector's Activity History page now has a link to the connector health report. The report is pre-filtered to display data specifically for that connector type, making it easy to access relevant information quickly.
For more information, see Connectors.
Updated 4 days ago