2024.2.12

Changes in Veza release v2024.2.12

This release introduced changes to the global Veza navigation to better organize products and operational areas. For more information about the changes or to submit your feedback, see UX Update - New Navigation Experience

EAC-32265 - Okta Group Parsing Errors: After upgrading, you might experience failures in Okta parse jobs due to unsupported condition expressions in Group Rules. We have identified this issue and plan to address it in a patch release scheduled for later this week.

Access Intelligence

New Features

  • Snowflake Data Governance Dashboard: Now generally available for customers using the Snowflake integration for insights into inert users and superusers, roles and super roles, role access, and least-privilege anti-patterns.

  • Salesforce Access Security: A dashboard of dedicated insights to complement the Veza integration for Salesforce. This page displays pre-configured queries for improved visibility on:

    • Salesforce Users & Their Mapping to Identity Providers

    • Users with Privileged Access

    • SFDC Profile and PermissionSet Analysis

    • Top Profiles mapped to Users, and top Profiles with privileged PermissionSets connected to users

Bug Fixes

  • EAC-31785: When opening a Query Builder result in Authorization Graph, the loading indicator now persists until results are available, instead of showing an empty search.

  • EAC-31971: Fixed an issue resulting in saved queries involving HRIS-type integrations not appearing on the Saved Queries page.

Access Reviews

Enhancements

  • EAC-32006 Actions for Expired and Completed Reviews: You can now use the View Action Log and See Row Details actions for additional information when viewing completed or expired Reviews.

  • FR-1782 Review Export: When exporting Reviews to PDF, the snapshot time for certification data is now indicated on the first page.

  • FR-1785, EAC-32050: Results now include an optional Is Active column for Access Review queries involving supertypes (such as All Top Level Principals to a resource).

Bug Fixes

  • EAC-31543: Reviewer Deny Lists now correctly prevent emails when choosing Reviewer managers to receive notifications for Access Reviews.

Lifecycle Management (Early Access)

Enhancements

  • EAC-31727 Pending Tasks: Added a section under Lifecycle Management showing jobs queued for execution at a future date based on a provisioning policy, including the scheduled time, job type, and provisioning source and target.

Veza Integrations

New Integrations

  • EAC-30745 Jira Data Center: New on-platform integration for discovering Jira Data Center Projects, Users, Groups, and Roles.

Enhancements

  • EAC-32008 GitHub SAML Name IDs (Early Access): Veza can now ingest and show the saml_name_id attribute for GitHub users, which can be used to create Custom Identity Mappings between external users in an identity provider and local GitHub accounts.

    • To gather this metadata when the feature is enabled, enter an Access Token when configuring the GitHub integration. This should be a Personal Access token created for a GitHub user with enterprise-level permissions. The token must have read:enterprise scope.

Bug Fixes

  • EAC-31923: Jira Custom Field Number and Text Issues: Fixed a bug where Jira issues were not created when they included Number and Text custom fields.

Last updated