What's new in this release

🗒️

For additional releases, see the full list of Identity Security Insights release notes.

New features

Just-in-time default access

Administrators no longer have to manually assign permissions when adding a new user. Instead, administrators can configure default access rules for single sign-on applications. When new users log in via an identity provider, they'll immediately have access to the site or application they need.

📘

For more information, see Identity providers.

Enhancements

More insights from connectors

Keys that need updating

The Azure connector script now includes the Key Vault Reader role on Management Groups. This role reads metadata of vaults and their certificates, keys, and secrets. It does not permit access to sensitive values, such as secret contents or key material.

Behavior detection rules

The Okta connector now collects data on behavior detection rules. This helps us understand how conditions like city, device, and access velocity trigger additional authentication in Okta's sign-on policies.

Inactive users

The Password Safe connector now collects data on inactive users. This helps enrich our data sets, provide more accurate information, and ensure no inactive users have access.

Link to connector report

A connector's Activity History page now has a link to the connector health report. The report is pre-filtered to display data specifically for that connector type, making it easy to access relevant information quickly.

📘

For more information, see Connectors.


©2003-2025 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.