LogoLogo
User GuideDeveloper DocumentationIntegrationsRelease Notes
  • 🏠Veza Documentation
  • ☑️Getting Started
  • 📖Veza Glossary
  • ❓Product FAQ
  • 🛡️Security FAQ
    • Advanced Security FAQ
  • Release Notes
    • 🗒️Release Notes
      • Release Notes: 2025-05-28
      • Release Notes: 2025-05-14
      • Release Notes: 2025-04-30
      • Release Notes: 2025-04-16
      • Release Notes: 2025-04-02
      • Release Notes: 2025-03-19
      • Archive
        • 2024.9.23
        • 2024.9.16
        • 2024.9.9
        • 2024.9.2
        • 2024.8.26
        • 2024.8.19
        • 2024.8.12
        • 2024.8.5
        • 2024.7.29
        • 2024.7.22
        • 2024.7.15
        • 2024.7.1
        • 2024.6.24
        • 2024.6.17
        • 2024.6.10
        • 2024.6.3
        • 2024.5.27
        • 2024.5.20
        • 2024.5.13
        • 2024.5.6
        • 2024.4.29
        • 2024.4.22
        • 2024.4.15
        • 2024.4.8
        • 2024.4.1
        • 2024.3.25
        • 2024.3.18
        • 2024.3.11
        • 2024.3.4
        • 2024.2.26
        • 2024.2.19
        • 2024.2.12
        • 2024.2.5
        • 2024.1.29
        • 2024.1.22
        • 2024.1.15
        • 2024.1.8
        • 2024.1.1
        • 2023.12.18
        • 2023.12.11
        • 2023.12.4
        • 2023.11.27
        • 2023.11.20
        • 2023.11.13
        • 2023.11.6
        • 2023.10.30
        • 2023.10.23
        • 2023.10.16
        • 2023.10.9
        • 2023.10.2
        • 2023.9.25
        • 2023.9.18
        • 2023.9.11
        • 2023.9.4
        • 2023.8.28
        • 2023.8.21
        • 2023.8.14
        • 2023.8.7
        • 2023.7.31
        • 2023.7.24
        • 2023.7.17
        • 2023.7.10
        • 2023.7.3
        • 2023.6.26
        • 2023.6.19
        • 2023.6.12
        • 2023.6.5
        • 2023.5.29
        • 2023.5.22
        • 2023.5.15
        • 2023.5.8
        • 2023.5.1
        • 2023.4.24
        • 2023.4.17
        • 2023.4.10
        • 2023.4.3
        • 2023.3.27
        • 2023.3.20
        • 2023.3.13
        • 2023.3.6
        • 2023.2.27
        • 2023.2.20
        • 2023.2.13
        • 2023.2.6
        • 2023.1.30
        • 2023.1.23
        • 2023.1.16
        • 2023.1.9
        • 2023.1.2
        • 2022.12.12
        • 2022.12.5
        • 2022.11.28
        • 2022.11.14
        • 2022.11.7
        • 2022.10.31
        • 2022.10.24
        • 2022.10.17
        • 2022.10.1
        • 2022.6.2
        • 2022.6.1
        • 2022.5.1
        • 2022.4.1
        • 2022.3.1
  • Features
    • 🔎Access Visibility
      • Graph
      • Query Builder
      • Saved Queries
      • Filters
      • Query Mode
      • Intermediate Entities
      • Regular Expressions
      • Tags
      • Tagged Entity Search
      • Assumed AWS IAM Roles
      • Veza Query Language
        • Quick Start
        • Syntax
        • VQL API
    • 💡Access Intelligence
      • Overview
      • Dashboards
        • Reports
        • Scheduled Exports of Query Results via a Secure Email Link
      • Risks
      • Analyze
      • Compare
      • Rules and Alerts
      • Entities
      • NHI Identify Classification Logic
      • NHI Secrets
    • 🔏Access Reviews
      • Get Started: Access Reviewers
      • Get Started: Review Operators
      • Access Review Tasks
        • Assign Reviewers
        • Create a Configuration
        • Create a Review
        • Draft Reviews
        • Edit a Configuration
        • Filters and Bulk Actions
        • Manage Access Reviews
        • Using the Reviewer Interface
        • Row Grouping for Access Reviews
        • Schedule an Access Review
      • Access Review Configuration
        • Access Reviews Query Builder
        • Access Reviews Global Settings
        • Configuring a Global Identity Provider
          • Alternate Manager Lookup
        • Customizing Default Columns
        • Email Notifications and Reminders
        • Identity Provider and HRIS Enrichment
        • Entity Owners and Resource Manager Tags
        • Multi-Level Review
        • 1-Step Access Reviews
        • On-Demand Reviews
        • Veza Actions for Access Reviews
        • Review Intelligence Policies
        • Review Presentation Options
        • Reviewer Selection Methods
        • Reviewer Digest Notifications
      • Access Review Scenarios
        • Access Reviews: Active Directory Security Groups
        • Access Reviews: Okta App Assignments
        • Access Reviews: Okta Group Membership
        • Access Reviews: Okta Admin Roles
        • Access Reviews: Azure AD Roles
        • Access Reviews with Saved Queries
        • Source-Only Access Reviews
    • 📊Access Monitoring
    • 🔄Lifecycle Management
      • Implementation and Core Concepts
      • Access Profiles
      • Policies
      • Conditions and Actions
      • Attribute Sync and Transformers
        • Lookup Tables
      • Integrations
        • Active Directory
        • Exchange Server
        • Okta
        • Salesforce
        • Workday
    • ⚖️Separation of Duties (SoD)
      • Managing SoD Risks with Veza
      • Creating SoD Detection Queries
      • Analyzing Separation of Duties Query Results
      • Example Separation of Duties Queries
      • SoD Manager Assignment
      • Access Reviews for SoD
  • Integrations
    • ✨Veza Integrations
      • Adobe Enterprise
      • Amazon Web Services
        • Add Existing AWS Accounts
        • Automatically Add New AWS Accounts
        • AWS DynamoDB
        • AWS KMS
        • AWS RDS MySQL
        • AWS RDS PostgreSQL
        • AWS Redshift
        • Activity Monitoring for AWS
        • Using AWS Secrets Manager for RDS Extraction
        • Notes & Supported Entities
      • Anaplan
      • Atlassian Cloud Products
      • Auth0
      • BambooHR
      • Bitbucket Data Center
      • BlackLine
      • Beeline
      • Boomi
      • Box
      • Bullhorn
      • Cassandra
      • Cisco Duo
      • Clickhouse
      • Concur
      • Confluence Server
      • Confluent
      • Coupa
      • Coupa Contingent Workforce
      • Crowdstrike Falcon
      • CSV Upload
        • CSV Upload Examples
        • CSV Upload Troubleshooting
        • CSV Upload API
      • Databricks (Single Workspace)
      • Databricks (Unity Catalog)
      • Delinea Secret Server
      • Device42
      • DocuSign
      • Dropbox
      • Egnyte
      • Expensify
      • Exchange Online (Microsoft 365)
      • Fastly
      • Google Cloud
        • Check Google Cloud Permissions
        • Notes & Supported Entities
      • Google Drive
      • GitHub
      • GitLab
      • HashiCorp Vault
      • HiBob
      • Hubspot
      • IBM Aspera
      • iManage
      • Ivanti Neurons
      • Jamf Pro
      • Jenkins
      • JFrog Artifactory
      • Jira Data Center
      • Kubernetes
      • LastPass
      • Looker
      • MongoDB
      • Microsoft Active Directory
      • Microsoft Azure
        • Azure SQL Database
        • Azure PostgreSQL Database
        • Microsoft Dynamics 365 CRM
        • Microsoft Dynamics 365 ERP
        • Notes & Supported Entities
      • Microsoft Azure AD
      • Microsoft SharePoint Online
      • Microsoft SharePoint Server
      • Microsoft SQL Server
      • MuleSoft
      • MySQL
      • NetSuite
      • New Relic
      • Okta
        • Okta MFA status
      • OneLogin
      • OpenAI
      • Oracle Cloud Infrastructure
      • Oracle Database
      • Oracle Database (AWS RDS)
      • Oracle E-Business Suite (EBS)
      • Oracle EPM
      • Oracle Fusion Cloud
      • Oracle JD Edwards EnterpriseOne
      • PagerDuty
      • Palo Alto Networks SASE/Prisma Access
      • PingOne
      • PostgreSQL
      • Power BI
      • Privacera
      • PTC Windchill
      • Qualys
      • QNXT
      • Ramp
      • Redis Cloud
      • Rollbar
      • Salesforce
      • Salesforce Commerce Cloud
      • SAP SuccessFactors
      • SCIM integration
      • ServiceNow
      • Slack
      • Smartsheet
      • Snowflake
        • Snowflake Native Application
        • Snowflake Row Access Policies
        • Snowflake Masking Policies
        • Exporting Saved Query Results to Snowflake
        • Audit Log Export
        • Event Export
      • Solarwinds
      • Spotio
      • Sumo Logic
      • Tableau Cloud
      • Teleport
      • Terraform
      • ThoughtSpot
      • Trello
      • Trino (PrestoSQL)
      • UKGPro
      • Veza
      • Windows Server
        • Enterprise Deployment
      • Workato
      • Workday
      • YouTrack
      • Zendesk
      • Zip
      • Zoom
      • Zscaler
      • 1Password
    • 🎯Integrations Overview
    • ⚠️Prerequisites and Connectivity
      • Insight Point
        • Deploying an Insight Point using the install script
        • Deploy with AWS EC2
        • Deploy with Virtual Appliance
          • Deploy with Virtual Appliance (Legacy)
        • Deploy with Azure Container Instances
        • Insight Point (Helm Chart)
      • Certificates with OpenSSL
    • ⚙️Configuring Integrations
      • Integrations FAQ
      • Extraction and Discovery Intervals
      • Custom Identity Mappings
      • Limiting Extractions
      • Enrichment Rules
      • ℹ️Running Veza Scripts with Python
  • Administration
    • 🛠️Veza Administration
      • Securing Your Veza Tenant
      • Veza Actions
        • Slack
        • ServiceNow
        • Jira
        • Webhooks
      • Virtual Private Veza
      • System Events
      • Sign-In Settings
        • SAML Single Sign-On
          • Single Sign-On with Okta
          • Single Sign-On with Microsoft Entra
          • Group Mapping for Okta
        • OIDC Single Sign-On
          • Single Sign-On with Okta (OIDC)
        • Attribute Mapping for SSO
        • Role Mapping for SSO
      • User Management
        • Multi-factor Authentication
        • Team Management
        • Support User Access
  • Developers
    • 🌐Veza APIs
      • Authentication
      • Troubleshooting
      • Pagination
      • Open Authorization API
        • Getting Started
        • Core Concepts
          • Connector Requirements
          • Using OAA Templates
          • Providers, Data Sources, Names and Types
          • Sourcing and Extracting Metadata
          • Naming and Identifying OAA Entities
          • Modeling Users, Permissions, and Roles
          • Custom Properties
          • Tagging with OAA
          • Cross Service IdP Connections
          • Incremental Updates
        • OAA Push API
          • OAA Operations
        • OAA Templates
          • Custom Application
          • Custom Identity Provider
          • Custom HRIS Provider
        • OAA .NET SDK
          • C# OAA Application Connector
        • OAA Python SDK
          • Application Outline
          • oaaclient modules
            • Client
            • Structures
            • Templates
            • Utils
        • Sample Apps
        • Example Connectors
      • Integration APIs
        • Enable/Disable Providers
        • Cloud Platforms and Data Providers
        • Identity Providers
        • Data Sources
        • Sync and Parse Status
      • Query APIs
        • Quick Start
        • Query Builder Terminology
        • Query Builder Parameters
        • Query Builder Results
        • List saved queries
        • Save a query
        • Get a saved query
        • Update a query
        • Delete a query
        • Get query node destinations
        • Get query nodes
        • Get query result
        • Get query spec node destinations
        • Get query spec nodes
        • Get query spec results
        • Private APIs
          • Get Access Relationship
          • Role Existence
          • Role Maintenance
          • Cohort Role Analysis
        • Tags
          • Create, Add, Remove Tag
          • Promoted Tags
      • Access Reviews APIs
        • Workflow Parameters Reference
        • List Workflows
        • List Certifications
        • List Certification Results
        • Update Certification Result
        • Force Update Result
        • Update Webhook Info
        • Get Certification Result
        • Manage Reviewer Deny List
        • Quick Filters
        • Help Page Templates
        • Smart Action Definitions
        • Delegate Reviewers
        • List Reviewer Infos
        • Get Access Graph
        • Automations API
        • Global Settings APIs
      • System Audit Logs
      • System Events
      • Notification Templates
        • Notification Templates API
      • Team and User Management APIs
        • Team API Keys
      • SCIM Provisioning
        • SCIM API Reference
        • SCIM Provisioning with Okta
  • Product Updates
    • 🆕Product Updates
      • Product Update: April'25
      • Product Update: March'25
      • Product Update: February'25
      • UX Update - Integration Management
      • Product Update: January'25
      • Product Update: December'24
      • Product Update: November'24
      • Product Update: October'24
      • Product Update: September'24
      • Product Update: August'24
      • UX Update: Veza Integrations
      • Product Update: July'24
      • Product Update: June'24
      • Product Update: May'24
      • Product Update: April'24
      • UX Update - Enhanced Reviewer Experience for Veza Access Reviews
      • Product Update: March'24
      • Product Update: February'24
      • Design Update: February'24
      • UX Update - New Navigation Experience
      • UX Update - Access Review Dashboards
      • Building Veza’s Platform and Products
      • Veza Product Update - Jan'24
      • Veza Product Update - 2H 2023
      • Veza Product Update - December'23
      • Veza Product Update - November'23
      • Veza Product Update - October'23
      • Veza Product Update - September'23
      • Veza Product Update - August'23
      • Veza Product Update - July'23
      • Veza Product Update - June'23
      • Veza Product Update - May'23
      • Veza Product Update - April'23
      • Veza Product Update - March'23
      • Veza Product Update - Feb'23
      • Veza Product Update - Jan'23
Powered by GitBook
On this page
  • Access Intelligence
  • Risks Enhancements
  • Dashboards Enhancements
  • Webhook and Export Enhancements
  • Access Requests
  • New Features
  • Enhancements
  • Access Lifecycle Management
  • New Features
  • Enhancements
  • Access Reviews
  • Enhancements
  • Non-Human Identity Security
  • Enhancements
  • Separation of Duties
  • Enhancements
  • Access Monitoring
  • New Features
  • Veza Platform
  • New Features
  • Veza Integrations
  • New Integrations
  • Integration Enhancements

Was this helpful?

Export as PDF
  1. Product Updates
  2. Product Updates

Product Update: April'25

Veza 2025.4: Identity Security Platform Advancements

Welcome to the latest Veza product update! This document offers a summary of the latest features, enhancements, and usability improvements introduced in recent platform updates.

Veza's 2025.4 release delivers powerful enhancements across access governance, non-human identity (NHI) security, compliance reporting, and platform extensibility—helping organizations reduce risk, improve audit readiness, and simplify identity operations at scale.

Key Business Benefits:

  • Faster Access Decisions: New entitlement sync, delegation, and Access Profile improvements streamline approvals while ensuring consistent governance across AD and cloud systems.

  • Tighter Lifecycle Policy Control: Access Lifecycle Management now includes safety limits to prevent unintended mass changes.

  • Improved Audit Readiness: Access Reviews and Separation of Duties (SoD) enhancements improve filtering, conflict visibility, and reviewer controls to support clean audits.

  • NHI Risk Reduction: Expanded NHI support for Workday, Google Secret Manager, and Azure enables more comprehensive discovery, reviews, and remediation of machine identities.

  • Stronger Access Visibility and Access Monitoring: New dashboards and access monitoring tools offer granular insights into dormant accounts, over-provisioned roles, and key identity threats.

  • Enterprise Integration Coverage: New support for Microsoft Dynamics 365 ERP, Coupa CCW, and enhancements to Okta, Salesforce, Workday, and Active Directory strengthen enterprise reach.

  • Streamlined User Management: SCIM provisioning and OpenID Connect (OIDC) improve access lifecycle automation and simplify SSO adoption.

Specific capability enhancements include:

  • Access Requests: New entitlement synchronization capabilities, delegation controls, and Access Profile management features.

  • Access Lifecycle Management: Enhanced policy management with safety limits and Coupa CCW integration.

  • Access Reviews: Improved filtering and group management controls for reviewers.

  • Non-Human Identity (NHI) Security: Enhanced support for Workday and Google Cloud Secret Manager.

  • Separation of Duties (SoD): New conflict visualization capabilities for SoD risks.

  • Access Intelligence: Improved risk management and dashboards.

  • Access Monitoring: Enhanced monitoring insights and historic activity filtering.

  • Veza Integrations: Support for Microsoft Dynamics 365 ERP, Coupa CCW, and integration enhancements.

  • Veza Platform: SCIM user provisioning APIs and OpenID Connect (OIDC) for Single-Sign-On (SSO).


Access Intelligence

Risks Enhancements

Standardized terminology: The Risks page is overhauled to provide a clear distinction between individual risky entities, and rules that define overall risks. The following terms are now used throughout the Veza UI:

  • Risk: Any query that has been assigned a risk level to define risks (e.g., "Okta users with phishable MFA").

  • Affected Entities: The results of a Risk query, i.e., the 5 specific Okta users with phishable MFA. An affected entity can be marked as an exception when needed.

Improved Risks UI: You can now search and manage entities in risk results with dedicated tabs on the Risks page.

Navigate between sections to get a full picture of active and remediated risks over time, manage queries marked as risks, and investigate individual risks.

  • Overview: High-level summary with burndown, platform breakdown, filters

  • All Risks: Full risk registry, filterable by entity, integration, and label

  • Affected Entities: Drill-down view of impacted identities/resources per risk

Dashboards Enhancements

Dashboard Overhaul: We've added new dashboards aligned to identity security use cases and enhanced existing ones for clarity, usability, and immediate insight. Out-of-the-box dashboards now include:

  • MFA Coverage

  • Account Takeover Coverage (ATO)

  • Resource Risks on Unstructured Data

  • Residual Access Coverage for ISPM

  • Identity Threat Detection and Response Coverage

Dashboard (Key Risk Indicators / KRIs) by Use Cases: Based on customer feedback, Veza dashboards are now organized by core use cases, on a new Dashboards > Use Cases tab:

Dashboard Design and Usability:

  • For Dynamic (label-based) dashboards/reports, users can now rename section tiles and merge sections.

  • Redesigned tiles now provide immediate access to Veza Actions (Launch Access Review, etc.)

  • CSV exports now include minimum and maximum risk values to identify entities with volatile risk scores that may require closer monitoring.

  • The "Save As New" action is now available for uneditable queries, allowing users to create copies of system or reference queries they couldn't modify directly.

  • A universal search bar is now shown on the Dashboards > Favorites page

Webhook and Export Enhancements

Alert Webhooks: When creating alert rules, you can now configure specific entity attributes to include in the JSON payload for 3rd-party webhooks.

Secondary Emails for Query Export: Exporting query results to email now supports additional recipients, so you can add team distribution lists or peer reviewers, and maintain continuity during absences.


Access Requests

New Features

Delegation and Deny Lists: Administrators can now appoint delegate approvers and maintain deny lists to control who can approve and request access requests in your organization. Go to Access Request Settings to define delegates, approver deny lists, and requestor deny lists.

"About This App" Instructions: Profile owners can now add contextual information for applications and bundles of entitlements directly in Access Profiles. Users requesting access can refer to these instructions for detailed guidelines.

  • How to use it: Edit any Access Profile to add instructions with markdown formatting. You can also quickly add instructions using the row actions menu.

Provide access prerequisites or contact information that helps users understand what they're requesting and how to use it once access is granted. Keep instructions concise and include links to more detailed documentation when necessary.

Entitlement Synchronization: Veza now supports periodic or manual entitlement synchronization to maintain the integrity of Active Directory group assignments.

  • How to use it: When creating an Access Profile Type that grants Active Directory Group entitlements, enable the Continuous Sync of Access Profile option and set the sync frequency in days, or choose Actions > Manually Sync on the Access Profiles page.

Enabling synchronization ensures that Access Profiles membership remains the authoritative source for linked Active Directory group membership, automatically re-adding users removed out-of-band, removing unauthorized direct additions to the group, and recreating accidentally deleted groups.

Enhancements

We've introduced a range of enhancements to enable Catalog configuration using Access Profiles:

Default Access Request Policies: Administrators can now set a default Access Request Policy to define default approval requirements for each Access Profile of a particular Access Profile Type.

  • How to use it: When creating an Access Profile Type, select a default Access Request Policy and optionally enable the Allow overwrite of Access Request Policy option.

Setting a default approval policy at the Access Profile Type level can help enable consistent governance across Access Profiles of the same type without requiring manual policy selection for each new profile.

Profile Integration Limits: Administrators can now control which systems can be associated with specific Access Profile Types. Limiting Access Profiles to specific integrations or integration types can help maintain separation between different environments or administrative domains.

  • How to use it: When creating a Profile Type, use the "Limit to a single integration" option (can be combined with other integration type options).

Profile Creation and Visibility Controls: Administrators can now define who can create Access Profiles, and which Access Profile Types users can view in the Catalog.

  • How to use it: Use the Access Profile Settings > Manage Permissions option for creation rights. Use the Manage Permissions action for individual Access Profile Types to enable visibility controls.

Grant profile creation rights to teams who understand proper entitlement models, and restrict specialized profile visibility to appropriate end-users.

Entitlements for Access Profile Types: It's now possible to create multiple conditional entitlement rules within a single Access Profile Type.

This can streamline administration by defining entitlement creation logic based on specific conditions within a single configuration:

  • Administrators can now define one or more rules with string conditions or any-match criteria when adding Access Profile Types.

  • Each rule can trigger different entitlement creation based on your business requirements, reducing the need to maintain separate Access Profile Types for similar scenarios.

  • For example, you could define a single Access Profile Type that creates different user entitlements based on department or location.

Transformers for Access Profiles: For more precise control over user attribute transformations during provisioning workflows, you can now choose specific Sync Identity transformers to use when creating entitlements through Access Profiles.

This enables different formatting rules to apply based on the entitlement granted. For example, when a Lifecycle Management policy contains multiple Sync Identity actions for the same target system, you can configure one Access Profile to create standard user accounts with {first_name}.{last_name} formatting while another creates admin accounts with {first_name}.{last_name}-admin formatting.

Slack Notifications (Early Access): You can now integrate Access Requests with Veza Actions for Slack to send announcements when an access request changes state.

Automatic Profile Type Selection: When creating new Access Profiles with only one available Access Profile Type, that type is pre-selected, reducing clicks in environments where only a single type is configured.


Access Lifecycle Management

New Features

Policy Safety Limits: Veza now supports configurable safety thresholds on policy execution to prevent unintended mass updates from occurring during workflow execution. When enabled, a warning appears when the number of impacted users exceeds the configured limit and the policy is halted. An administrator can choose to process the pending changes or ignore and re-enable the policy.

  • How to use it: When creating a Lifecycle Management policy, define a Safety Limit for the maximum number of identities that can be changed in a single policy run.

Implement safety limits for policies with broad selection criteria, especially in production environments. If a limit is exceeded, review the affected identities in the warning details before proceeding.

Coupa CCW Integration: Lifecycle Management now supports Coupa Contingent Workforce as a source of identity for non-employee identities.

  • How to use it: When adding the integration to Veza, toggle the Provisioning Source option in the integration configuration.

You can create separate Access Profiles and Lifecycle Management Policies for contractors to maintain distinct access models from regular employees.

Enhancements

Policy Draft Mode: Administrators can now enable a global option to choose between immediate policy updates and version-controlled policy editing.

  • How to use it: In Lifecycle Management > Settings > Policy Settings, toggle Enable Policy Draft Mode.

When enabled, users can edit policies in draft mode, review changes, and publish when ready. The complete version history is available in the editor for comparing changes and restoring previous versions when needed.

Lookup Table Export: You can now export custom lookup tables for offline analysis and troubleshooting.

  • How to use it: When viewing lookup tables for a Lifecycle Management Policy, use the export option to download the table in CSV format.

Refer to the CSV export to diagnose complex provisioning issues and compare expected mappings against actual attribute values.

ASCII Transformer for Identity Attributes: Lifecycle Management policies now support an ASCII transformer for handling international character sets. This transformer removes non-printable characters and converts non-ASCII characters to their closest ASCII equivalents, and can be especially useful when provisioning to legacy systems that only support ASCII.

Sync Identities Fallback Formatters: The Sync Identities action now supports Additional Formatters as part of the action configuration. These fallback formatters automatically generate alternative values during provisioning when unique ID attributes (like usernames or email addresses) are already in use.

  • How to use it: Configure fallbacks by editing a Sync Identities action and adding transformer patterns that will be tried sequentially until a unique value is found. Common implementations include using the NEXT_NUMBER transformer to append sequential numbers (e.g., jsmith1, jsmith2) or other transformers like RANDOM_ALPHANUMERIC_GENERATOR.


Access Reviews

Enhancements

No Reviewers Filter: Administrators and operators can now quickly filter to find rows missing reviewer assignments by filtering the Reviewers column.

  • How to use it: In the Reviewer Interface, choose the Filter By option in the Reviewers column and select Does not exist as the filter operation.

Use this option before publishing draft reviews to identify and fix incomplete reviewer assignments and mitigate orphaned review items.

Group By Controls: Reviewers can now expand or collapse all grouped rows with a single action.

  • How to use it: When using the "Group By" option in the review interface, look for the Expand/Collapse All controls above the groups.

Reviewer Reassignment Control: Administrators can now restrict reviewers from assigning other users to review their assigned rows.

  • How to use it: To enable this setting for an individual Review Configuration, toggle Enable Reviewer Reassignment when editing the configuration. To enforce this setting globally, toggle Access Reviews > Settings > Reviews > Enable Reviewer Reassignment.

Email Notification Templates: Administrators can now create multiple notification templates for the same event type and assign them to specific review configurations. Previously, only one template could exist per event type, which applied to all configurations.

  • How to use it: Customize templates under Access Reviews Settings > Notifications > Notification Templates.

Using custom notification templates, you can tailor notification language to specific teams or departments while maintaining consistent messaging elsewhere, including:

  • One default message template per event type (applied to all configurations)

  • Additional templates for each event type (review completed, on row sign-off, etc.)

  • Specific templates for individual review configurations as needed


Non-Human Identity Security

Enhancements

Workday Integration System Users: Veza now automatically identifies Workday Accounts associated with non-human identities.

  • Detection criteria: Accounts are classified as NHIs when they are Integration System Users or have UI access disabled.

Filter the NHI Accounts page by Workday integration to review and manage these service accounts. You can now incorporate these entities in recurring certification initiatives.

Google Cloud Secret Manager: The Google Cloud integration now supports enhanced NHI search and analysis for managed secrets:

  • Supported entities and attributes: Google Cloud Secrets and KMS Keys now have the last_rotated, status, and secret_type attributes.

You can create queries combining these attributes to identify secrets requiring rotation or remediation (e.g., production secrets not rotated in 90+ days).

NHI Access Reviews: It's now possible to create targeted reviews directly from the NHI overview page.

  • Launch Access Review: Create On-Demand Reviews by navigating to the Non-Human Identities > Accounts overview, selecting entities for review, and choosing the Launch Access Review action.

Create dedicated NHI review configurations in advance with appropriate columns and reviewer assignments. To create access reviews, users must have the Administrator or Operator root team role.

Azure Managed Identities: Azure Managed Identities now automatically have the "nonhuman" identity type, enabling NHI management and search for Azure workloads using managed identities to access downstream resources.

NHI Accounts Overview: A banner on the NHI Security > Accounts page now provides immediate visibility into total NHI accounts detected and which integrations they come from.


Separation of Duties

Enhancements

Viewing Conflicting Entitlements for SoD Queries: You can now easily view roles and permissions causing SoD violations for individual users in the query results.

  • View Conflicts: From the SoD overview page, choose a query and click Open In Analysis, then use the new View Conflicts action to show entitlements for each user in a sidebar.

When remediating conflicts, use this view to determine precisely which entitlements need modification. Identify conflicts, document the specific entitlements involved, and work with resource owners to determine which access to revoke.


Access Monitoring

New Features

Access Monitoring Insights: The Access Monitoring page now surfaces key insights at a glance, including:

  • Dormant vs. Total metrics for IAM User, Role, and Group activity

  • Platform-specific metrics: Privileged Dormant Roles, Over-provisioned Dormant Users

  • Dedicated dashboards for Snowflake, AWS, and Okta

Google Activity Monitoring: Veza now tracks activity involving service account impersonation within Google Cloud. Activity events are now generated when a Google Workspace User accesses resources by impersonating a Service Account, and reflected in "Last Activity At" and "Last Activity With Resource At" timestamps.

Last Activity Filtering: In Query Builder, you can now filter results on the "Last Activity At" and "Last Activity With Resource At" columns. You can use these attributes to identify the:

  • Last time of any activity for a particular entity/resource

  • Last activity from a particular identity on a particular resource

You can use these attributes to identify dormant accounts by filtering for entities with no recent activity, infrequently used access rights by filtering for resources with minimal activity, and generate cleanup lists for access review campaigns using the saved query.


Veza Platform

New Features


Veza Integrations

New Integrations

  • Microsoft Dynamics 365 ERP: Discover users, groups, and security roles in the enterprise resource planning platform.

  • Coupa CCW: New Integration for Coupa Continent Workforce (CCW).

Integration Enhancements

  • CSV Upload Enhancements: An improved CSV upload flow for creating integrations is now generally available. The new integration supports modeling custom applications and HRIS systems using imported data, and mapping CSV columns to custom or built-in entity attributes.

  • Okta: Added support for the WORKFLOWS_ADMIN built-in role, providing visibility into highly privileged role assignments.

  • Okta: When configuring an Okta integration, administrators can now limit extractions to user entities, skipping groups, apps, roles, role assignments, app users, and app groups. When using this option, only okta.users.read permission is required for the integration.

  • Open Authorization API: You can now set an external identity for IDP Groups when submitting a payload for a Custom Identity Provider. This will be used to map federated identities with a matching ID.

  • Salesforce: The RecordTypeId attribute is now available for Salesforce Account and Opportunity objects, enabling more granular permissions analysis.

  • Workday: Added OAuth token support for gathering Custom Reports, for securely populating additional attributes for Workday Workers.

  • Active Directory: Added the ability to specify an explicit Service Principal Name (SPN) when using Kerberos authentication for Active Directory integration. This optional field defaults to ldap/<domain_controller_hostname> if not provided.

  • Salesforce: Veza can now extract additional attributes for Salesforce objects: CreatedById, CreatedDate, LastActivityDate, LastModifiedDate, LastModifiedById, OwnerId, SystemModStamp. The integration also now shows Account Type and Opportunity Type, StageName.

PreviousProduct UpdatesNextProduct Update: March'25

Last updated 1 day ago

Was this helpful?

SCIM User Provisioning: Veza now supports automated user management with SCIM-compliant APIs. Refer to the for API reference and configuration steps.

OpenID Connect: OIDC authentication is now available to all customers. See for example configuration and setup guidance.

🆕
documentation
Single Sign-On with Okta (OIDC)
Risks UI Enhancement
Dashboard Use Cases
Alert Webhooks Configuration
Access Monitoring Insights