2022.10.17
Workflows
Queries can now search across all Custom Apps and Identity Providers. When creating a new workflow, the source, destination, or intermediate node can be an aggregate selection of:
All Custom Applications
All Custom Groups
All Custom IdPs
All Custom Resources
All Custom Roles
All Custom Subresources
All Custom Users
This enables a single workflow to include entities from a range of OAA data sources, for example:
Okta Users
toAll Resources for All Apps
with intermediate node=All Custom Users
.Added optional certification view columns to show the Principal ID, Source ID and Intermediate Node ID.
Users with the Admin or Operator role can no longer reassign reviewers for signed-off rows.
Certification result filters can now apply to rows' assigned reviewers.
When starting a Smart Action, you can now type to search for a field to filter on.
Fixed a bug where the horizontal scrollbar could disappear when filtering certification results.
Fixed a bug causing unusually long certification creation times.
Integrations
The Early Access Databricks integration now discovers permissions for Azure AD, Okta, and AWS Identity Center users granted via single sign-on (SSO). You can now select this Identity Provider by
type
andid
when configuring a Databricks integration.Veza now collects basic attributes for Okta Groups such as Type, Object Class, Description, Last Membership Updated, and other searchable properties. Added the Status Updated At property for Okta Users to enable searching disabled users by deactivation date.
Extraction Limits for Google Cloud now allow filtering by project Name in addition to ID.
Added an error message when using Check Google Cloud Permissions before an initial extraction is completed (Veza must be able to connect to your Organization and parse the policy before it can be validated).
To prevent performance degradation, a maximum of 5 Open Authorization API push payloads can now be processed in parallel.
Search and Query Builder
The Query Builder Grouped by dropdown menu is now filtered correctly when the source is a custom application (OAA) entity.
Custom Applications (added using Open Authorization API) now correctly appear when using Actions sidebar > Properties to view relationships for a selected node.
Links to shared searches now correctly direct users to the Authorization Graph upon log in.
Fixed a bug where tables view wasn't an option for some queries.
Last updated
Was this helpful?