Regular channel changelog
Subscribe to get automatic updates. Learn more in Track regular channel releases.
For release notes published before May 2025, refer to the Regular channel changelog archive.
October 2025
21 Oct 2025
Version 19190.10
Key features
- Create custom authentication nodes (IAM-5759)
-
Advanced Identity Cloud lets you create your own nodes to reuse common functionality in authentication journeys. Define properties and run custom server-side scripts in these nodes to dynamically set values and decide the outcome of journeys.
Learn more in Custom nodes.
- Next-generation OAuth 2.0 access token modification scripts (AME-31083)
-
You can now create next-generation access token modification scripts that can use next-generation common bindings, such as
httpClient,openidm, andutils. - Mapping custom key IDs to secrets (AME-31380)
-
You can now map custom
kidheader values for JWTs signed with the signing key to a specific ESV secret. - Nodes to support backchannel authentication journeys (AME-31636 and AME-31635)
-
The new Backchannel Initialize node and Backchannel Status node let you implement backchannel authentication from within a journey.
- Journey binding for scripted nodes (OPENAM-23127)
-
The new
journeybinding for scripted nodes lets you obtain details of the current journey, including inner or child journeys.
Enhancements
-
AME-30984 and AME-30609: Enhanced authentication audit logging to include the SAML Identity Provider (IdP) and Service Provider (SP) entity IDs during SAML flows. This information lets you report on the SAML applications users are accessing, supporting analytics and dashboarding efforts.
-
AME-30985: In SAML v2.0 single sign-on (SSO) flows, the JSON web token (JWT) created in the browser’s session storage no longer expires.
-
AME-31082 and SDKS-3681: Added support for device token refreshing to the Push Notification Service endpoint, enabling the reception of new tokens from mobile devices.
-
AME-31351 and AME-31471: Improvements to the Device Code flow mean that end users are now prompted to reauthenticate even when there’s an existing session for must-run and app journeys.
-
AME-31398: The PingOne Protect Evaluation node has been enhanced to support custom attributes. To specify custom attributes to be used in PingOne Protect for custom predictors, set the
Node State Attribute For Custom Attributesin the node configuration. The node retrieves a map of custom attributes from the node state to be used in the evaluation request to PingOne Protect. -
AME-31656 and AME-31468: The PingOne Protect Evaluation node has been enhanced to support dynamic risk policy IDs and target app IDs. To set the risk policy set ID dynamically, enable
Use Node State Attribute For Risk Policy Set IDin the node configuration. To set the target app ID dynamically, enableUse Node State Attribute For Target App IDin the node configuration. This instructs the node to obtain these IDs from the node state. -
AME-31487: Improvements to SAML v2.0 standalone mode include replacing legacy JSPs with URL endpoints.
You can still invoke the JSPs because they’re mapped to URLs for backward compatibility, but any customizations to these JSPs will be lost.
The following URLs supersede SAML v2.0 JSPs:
URLs
Old URL New URL /saml2/jsp/exportmetadata.jsp/ExportSamlMetadata/saml2/jsp/idpSingleLogoutInit.jsp/IDPSloInit/saml2/jsp/idpSingleLogoutRedirect.jsp/IDPSloRedirect/saml2/jsp/idpSingleLogoutPOST.jsp/IDPSloPOST/saml2/jsp/idpMNIRedirect.jsp/IDPMniRedirect/saml2/jsp/idpMNIRequestInit.jsp/IDPMniInit/saml2/jsp/idpSSOFederate.jsp/idpSSOFederate/saml2/jsp/spAssertionConsumer.jsp/Consumer/saml2/jsp/saml2AuthAssertionConsumer.jsp/AuthConsumer/saml2/jsp/spSingleLogoutInit.jsp/SPSloInit/saml2/jsp/spSingleLogoutRedirect.jsp/SPSloRedirect/saml2/jsp/spSingleLogoutPOST.jsp/SPSloPOST/saml2/jsp/spMNIRedirect.jsp/SPMniRedirect/saml2/jsp/spMNIPOST.jsp/SPMniPOST/saml2/jsp/spMNIRequestInit.jsp/SPMniInit/saml2/jsp/spSSOInit.jsp/spssoinit/saml2/jsp/idpSSOInit.jsp/idpssoinit/saml2/jsp/idpSSOFederate.jsp/idpSSOFederate/saml2/jsp/SA_IDP.jsp/idpsaehandler/saml2/jsp/SA_SP.jsp/spsaehandler -
OPENAM-23051 and AME-31918: A new ESV,
esv.oauth2.request.object.restrictions.enforcedlets you enforce stricter adherence to the PAR and JAR specifications.Setting the value of this ESV to
trueenforces the following: The authorization server ignores authorize parameters outside therequest_uri. When sending a JWT-Secured Authorization Request (JAR), therequest_urimust be anhttpsURI. -
IAM-8236: The ability to edit journeys from the AM native admin console has been removed. Use the Advanced Identity Cloud admin console to edit journeys.
-
IAM-9000, IAM-9001: Add annotations and sticky notes to journeys to assist learning and collaboration.
-
IAM-9237: Allow ESVs to be embedded in URL fields for federation IdPs. This lets you set up federation IdPs with fewer ESVs because you can define a single ESV containing a UUID shared by multiple URL fields.
-
IAM-9246: Table columns are now resized uniformly across all table views.
-
OPENAM-20776: A new OIDC client configuration option,
Private Key JWT Audience, lets you configure and override the audience (aud) claim of a Private Key JWT. -
OPENAM-21783: Improved token management for OAuth 2.0 client applications.
-
OPENAM-23669: Full scopes (scopes ending in
*) can now be used by service accounts in all cases where more specific scopes (for example,:read) are used. -
OPENAM-23710: The
httpClientbinding is now available to legacy SAML 2.0 IdP adapter scripts. -
OPENAM-23850: Enhanced the PingOne Verify Evaluation node with an
Allow same device verificationoption that lets end users continue verification on their current device. -
OPENAM-23867: The LDAP Decision node no longer logs credential failures as errors. It now logs them at the
infolevel. -
OPENAM-24062: Added support for the
ECDSAalgorithm to theutils.crypto.subtlenext-generation binding. This algorithm is supported for key generation, signing, and verification.
Fixes
-
AME-31351 and AME-31471: Improvements to the Device Code flow mean that end users are now prompted to reauthenticate even when there’s an existing session for must-run and app journeys.
-
AME-31481: Validation around policy creation has been improved. If you’re using the legacy "Policy" environment condition (or a custom environment condition), you’ll need to add that to the list of allowed environment conditions for your policy set to create or update policies that use that condition type.
-
IAM-9153: Password validation now works correctly when pasting a value that matches the existing value.
-
OPENAM-20749: A new ESV,
esv-enable-oauth2-sync-refresh-token-issuercauses a stateful OAuth 2.0 introspect response to overwrite theissclaim of the introspectable token. To enable this behavior, set this ESV tofalse. -
OPENAM-23770: Canceling a WebAuthn flow now results in a
Client Erroroutcome, rather than an internal failure. -
OPENAM-24159: Fixed an issue that prevented multiple Identity Assertion nodes from being used in a single journey.
September 2025
30 Sept 2025
Version 19054.9
Enhancements
-
OPENAM-24486: Improved performance when creating large numbers of OAuth 2.0 clients simultaneously.
Fixes
-
OPENDJ-11486: Fixed an exception caused when identity management queries for users with a filter containing wildcards and specific object classes.
Related releases
|
This section contains information about releases of other Ping Identity products that are often deployed as part of an Advanced Identity Cloud implementation. To take advantage of these updates, you must manually upgrade your RCS implementation. |
-
RCS 1.5.20.32 is now available to download. Learn more in ICF release notes.
22 Sept 2025
Version N/A
Key Features
- Log event exporter (FRAAS-19963)
-
Advanced Identity Cloud now lets you export log event data to an external monitoring tool, such as an OpenTelemetry-compatible SIEM or Splunk. This helps you monitor events and troubleshoot issues in near real time.
Learn more in Export log events to an external monitoring tool.
This feature requires Advanced Identity Cloud version 18842.8 or later.
17 Sept 2025
Version 18842.8
Enhancements
-
ANALYTICS-582[2][3]: Custom objects can now be used as data sources for reporting. The system uses an object’s configured title for the data source name, makes its properties available as attributes, and represents all object relationships.
-
ANALYTICS-1165[2]: Added the capability to change a report name.
-
ANALYTICS-1195[2]: Added the ability to import and export report templates using reports API endpoints.
-
FRAAS-25919: You can now use the API to configure custom domains for the Advanced Identity Cloud admin console.
-
IAM-8922: The Advanced Identity Cloud admin console now accepts ESV placeholders for the following federation fields:
-
Application ID
-
Application Secret
-
Well-Known Endpoint
-
Authorization Endpoint
-
User Info Endpoint
-
Token Endpoint
-
Issuer
-
-
IAM-8982[4]: Add event function for setting the query filter/select options of a select field.
-
IAM-9066: Added Tenant Auditor option to Advanced Identity Cloud admin console federation groups claim.
-
IAM-9099, IAM-9146, IAM-9167: Many table views now support column resizing and customization.
Fixes
-
IAM-5488: Terms and Conditions now respects target attribute in anchor tags.
-
IAM-6588: The Advanced Identity Cloud admin console now correctly displays journey status for journeys disabled and enabled using ESVs.
-
IAM-8887: Prevent browsers auto-filling passwords in user registration journeys.
-
IAM-8940: Managed identity number property now accepts float values.
-
IAM-8956: Deselecting the Personal Information option now disables the section containing the user avatar in hosted account pages.
-
IAM-9169: Fixed styling for responsive table layouts with sticky action column in Identities table views.
-
OPENIDM-21372: Advanced Identity Cloud now prevents access to the identity repository endpoint,
/openidm/repo. This prevents uncontrolled and potentially incompatible schema changes.
Additional information
The new PingOne integration guide helps you configure Advanced Identity Cloud to use PingOne products such as PingOne Protect and PingOne Verify. The guide covers the following topics:
-
Best practices for naming and arranging PingOne environments.
-
Best practices for configuring PingOne workers and Advanced Identity Cloud worker services when integrating with PingOne products.
-
How to configure, test, and optimize PingOne Protect.
12 Sept 2025
Version 18712.10
Enhancements
-
OPENAM-24476[5]: Added
java.util.zip.Deflater,java.util.zip.Inflater,java.util.zip.DeflaterOutputStream, andjava.util.zip.InflaterInputStreamto the allowlist for Scripted Decision nodes.
03 Sept 2025
Version 18712.7
Enhancements
-
FRAAS-24857: CNAME verification is no longer required when creating a custom domain.
-
FRAAS-25547: The sender address for emails sent to Advanced Identity Cloud tenant administrators is now
saas@pingidentity.com. -
FRAAS-26063: You can now override the
samlErrorPageUrl. To do so, configure an ESV variable namedesv-global-saml-error-page-urland set its value to your SAML error page URL. If you don’t set this variable, Advanced Identity Cloud uses the default value of/saml2/jsp/saml2error.jsp.
Fixes
-
FRAAS-25734: Exception stacktraces in access management and identity management logs are now truncated to approximately 300-400 lines.
-
FRAAS-25821[6]: Fixed an issue that prevented IP rules in Proxy Connect from being disabled.
August 2025
19 Aug 2025
Version 18368.10
Enhancements
-
OPENAM-24384: Added
javax.crypto.SecretKeyFactory,javax.crypto.spec.PBEKeySpec, andcom.sun.crypto.provider.PBKDF2KeyImplclasses to the allowlist for theOAUTH2_ACCESS_TOKEN_MODIFICATIONscripting context.
Fixes
-
OPENAM-24393[5]: Fixed an issue where the InnerTreeEvaluator node failed for authentication journeys initially accessed using REST without an
authId.
12 Aug 2025
Version 18368.8
Key features
- Policy binding for next-generation scripting (AME-26150)
-
The next-generation
policybinding lets you access the policy engine API and evaluate policies from within scripts. Thepolicybinding works in a similar way to the Request policy decisions for a specific resource API call. - Set Error Details node (AME-30968)
-
The Set Error Details node adds details to the JSON response when a journey ends in an error.
- Monitor log entries in the admin console (FRAAS-25665)
-
Advanced Identity Cloud now provides a console for monitoring log entries in development and sandbox[7] environments. You can view, filter, and search log entries for specific log sources within a timeframe to quickly identify issues, track events, and ensure system security.
Learn more in Monitor log entries in the admin console.
- Custom WS-Fed applications (IAM-8261)
-
You can now create custom WS-Fed[8] applications for single sign-on (SSO).
- Try In SDK button (IAM-8618)
-
A Try In SDK button has been added to the Details page for Native / SPA applications. This lets developers quickly test SDKs with dynamic configuration code snippets.
Enhancements
-
AME-31372[9]: An Agent journey is now available by default in both Alpha and Bravo realms. The
Agentjourney makes it easier to integrate with Ping Identity agents and gateways. It validates the agent credentials with an Agent Data Store Decision node. -
AME-30050: You can now enable a next-generation script in the AM admin console native console to run after a Dynamic Client Registration request is processed.
-
AME-30716: Removed
Failed to create SSO Tokenfrom logs at warning level. To observe these warnings, increase the log level to debug. -
AME-30801: The Inner Tree Evaluator node now has an optional Error Outcome that lets you capture exception details if an exception occurs during the evaluation of the child journey.
-
FRAAS-25818: The built-in SMTP server in new tenants now has a limit of 10 emails per minute and a fixed email sender address with the format
noreply@<tenant-fqdn>. -
IAM-7581: Text wrapping in table views has been improved for readability.
-
IAM-8573: IDM now includes an endpoint to retrieve individual themes from the
/themerealmconfiguration using either anIDor a_queryFilterby name. This improves performance and ensures reliable theme loading, even on slow networks. -
IAM-8610: When you create an SSO application for Microsoft 365, the application now generates a signing certificate, which you can download or rotate as needed.
-
IAM-8633: You can now add, remove, and rearrange table columns for managed identities and application provisioning tables.
-
IAM-8925[10]: In Identity Governance, you can now configure actions that trigger automatically when a form first loads or when a user changes the value of a specific field.
-
OPENAM-22467: Customers can now provide any value in the
typheader in JWTs. -
Greater control over journey session duration and authenticated session timeouts:
-
OPENAM-23265: The Set Session Properties node now lets you customize the Maximum Session Time and Maximum Idle Time of the session granted at the end of the journey.
-
OPENAM-23290: The new Update Journey Timeout node lets you update the timeout of the journey.
-
OPENAM-23291: The Email Suspend node now lets you configure the Suspend Duration in minutes. This duration overrides existing global or realm settings.
-
OPENAM-23515: You can now set the suspend duration in next-generation scripted decision nodes when suspending the journey.
-
-
OPENAM-23438: Following WebAuthn registration and authentication, new information is added to the transient state.
-
OPENAM-20709: On successful authentication, the WebAuthn Authentication node now adds the UUID of the device (
webauthnDeviceUuid) and the name of the device (webauthnDeviceName) to the shared state. This lets you track the use of biometric authentication and the device used to authenticate.
Fixes
-
AME-30969: If the OIDC Claims Plugin Type in the OAuth 2.0 provider is set to
SCRIPTEDbut no script is selected, theuserinfoendpoint now returns thesubclaim, in compliance with the OIDC specification. Previously, theuserinfoendpoint returned an empty JSON object. If you still require this behavior, set theesv-scripting-legacynulloidcclaimsscriptbehaviourESV totrue. -
IAM-4397: Fixed an issue in the hosted journey pages where the prompt text for the Choice Collector node wasn’t fully visible and the default option wasn’t visible at all.
-
IAM-8632: Fixed an issue where validation errors were incorrectly displayed for pre-populated fields.
-
IAM-8789: Managed identity modals now correctly handle both single-value and array-based enum types.
-
IAM-8871: The hosted account pages no longer freeze and throw an error when editing details if there are empty custom enum array values.
-
IAM-8902: The application username field in SAML 2.0 NameID flows is now correctly set to
uidinstead ofusername. -
IAM-8933: Fixed an issue in the Advanced Identity Cloud admin console when creating or modifying identity objects with a required boolean property. You can now set the value of the required boolean property to
false. -
IAM-9062: Hosted pages themes no longer continuously refresh when trying to set up or confirm two-factor authentication (2FA).
-
OPENAM-20749: For server-side OAuth 2.0 tokens, the /oauth2/introspect response can now overwrite the
issclaim of the introspectable token. To enable this behavior, set theesv-enable-oauth2-sync-refresh-token-issuerESV tofalse. -
OPENAM-22928: When agents authenticate to Advanced Identity Cloud, the session created no longer expires.
-
OPENAM-23303[9]: Fixed an issue where access management scripts were failing to load because they contained strings that resembled configuration placeholders. The code that parses these scripts now correctly ignores configuration placeholders and any strings that resemble them.
If you have access management scripts that reference ESVs, ensure that they use the correct syntax for ESVs. For example, for a script that references an ESV named esv-my-variable, use the syntaxsystemEnv.getProperty("esv.my.variable"). -
OPENAM-23334: You can now use the
mergeSharedandmergeTransientmethods to add nested objects toObjectAttributes. -
OPENAM-23519: Improved error handling during WebAuthn registration when the Android lock screen isn’t enabled.
-
OPENAM-24159: Fixed an issue with Identity Assertion nodes failing if there are more than one in a journey.
Removed
- Modules and chains (AME-30762)
-
The legacy PingAM authentication mechanism using modules and chains is enabled by default in Advanced Identity Cloud but has never been supported. Modules and chains remain enabled but have been removed from the Advanced Identity Cloud admin console.
Modules and chains will be removed entirely in the near future. If you’re using them for authentication, you must migrate to nodes and journeys as soon as possible.
Advanced Identity Cloud provides default journeys that replace the corresponding default modules and chains. Any default authentication processes that relied on modules and chains are unaffected by their removal.
July 2025
08 Jul 2025
Version 18076.3
Enhancements
-
AME-31379: Setting the new ESV
esv-oauth2-provider-request-object-processing-enforcedtotruenow lets admins enforce which validation rules are applied when processing OAuth 2.0 request objects. -
FRAAS-25437: Tenant administrators with the
tenant-auditorrole can now use federated access to authenticate to Advanced Identity Cloud. -
IAM-3441: Added pagination to all list views.
-
IAM-7265: You can now right-click a node in the journey editor to access a context menu.
-
IAM-7266: Added an action bar to the journey editor that lets you deselect or delete currently selected nodes.
-
IAM-7580: Pages now span the full width of the screen, improving navigation and usability.
-
IAM-8260: Advanced Identity Cloud now supports multiple WS-Fed[8] applications.
-
IAM-8640: The Release Notes link in Tenant Settings now opens the release notes for the tenant’s specific version.
-
IAM-8714[4]: You can now configure columns in the Identity Governance access review page.
-
OPENIDM-21206: Usernames and application names must now be unique, as enforced by the datastore.
Fixes
-
IAM-7413: The reCAPTCHA Enterprise node is now fully supported.
-
IAM-8489: Fixed an issue with the display of application logos in the hosted account pages.
-
IAM-8770: Fixed an issue with the calendar icon position in date fields.
-
IAM-8773: Fixed an issue where key actions such as realm login were blocked in older tenants with an unmodified original theme.
The impact of the fix for IAM-8773 is that unmodified original themes in older tenants have been purposefully updated to add any missing theme properties that are present on the latest themes. This has been done to make them compatible with recent efficiency improvements to themes in the hosted account pages, but without changing their appearance.
The missing properties will appear in your promotion reports, but this is expected and does not require you to take any action.
Related releases
|
This section contains information about releases of other Ping Identity products that are often deployed as part of an Advanced Identity Cloud implementation. To take advantage of these updates, you must manually upgrade your RCS and PingGateway implementations. |
-
The RCS 1.5.20.30 release is now available to download. Learn more in ICF release notes.
-
The PingGateway 2025.6.1 release is now available to download. Learn more in PingGateway 2025.6.1.
03 Jul 2025
Version 17889.11
Fixes
-
IAM-8314[5]: Fixed an issue where setting ESVs in connector or provisioner configuration stops the Advanced Identity Cloud admin console from being able to update connectors or run a liveSync operation.
June 2025
24 Jun 2025
Version 17889.7
Key features
- Tenant auditors (IAM-8086)
-
Advanced Identity Cloud now lets you invite tenant auditors to access the Advanced Identity Cloud admin console. Tenant auditors can view settings, configuration, and data but cannot modify them.
Learn more in Tenant administrator groups.
Enhancements
-
FRAAS-25155: Increased log batching size to avoid truncation of large JSON log entries.
-
ANALYTICS-868: The Tenant Admin Activity report has been changed to the Tenant Admin Initiated Entity Type Changes report. The new report provides more detailed and business-friendly insights into changes made by tenant administrators:
-
Field names added, deleted, or modified.
-
Before and after values of changed attributes (if applicable).
-
Business-friendly entity name and entity type changes to custom attributes and custom objects.
Learn more in Tenant admin initiated entity type changes report.
-
-
IAM-8405: You can now duplicate out-of-the-box reports.
-
IAM-8591: Dynamic sorting for report results. You can now sort report results directly in the Advanced Identity Cloud admin console after running a report.
Fixes
-
FRAAS-25142: Fixed a memory issue in the ESV service.
-
FRAAS-25434: Fix issue causing source to sometimes be defined as
unknownin/monitoring/logs/*endpoints. -
FRAAS-25226: Allow a higher threshold for large JSON log entries before splitting them into smaller plaintext log entries.
Deprecations
-
FRAAS-23329: Access to ESV REST API endpoints using the fr:idm:* scope is now deprecated.
-
FRAAS-23330: Access to ESV REST API endpoints using resource version 1.0 is now deprecated.
-
FRAAS-25269: The IDC.CLI OAuth 2.0 client is now deprecated in existing tenants and no longer provisioned in new tenants.
Learn more in Deprecation notices.
10 Jun 2025
Version 17713.5
Key features
- Akamai Account Protector node (TNTP-227)[9]
-
Use the Akamai Account Protector node to inject the Akamai risk score into your authentication journey. When the Akamai Account Protector feature is enabled for your application, the Akamai Edge service provides the risk score in an HTTP header, which is consumed by the Akamai Account Protector node.
Learn more in Akamai Account Protector node.
Enhancements
-
FRAAS-25205: Consolidated
End User UI,Login UI,Administrator Registration UI, andAdministrator UIstatus page components into a singleAdministrator UIcomponent as they were all reporting the same service. -
IAM-2453[9]: Hosted pages themes now show the loading spinner until they are fully loaded.
-
IAM-4769[9]: Hosted journey pages now fall back to the default theme if a journey is configured with a deleted theme.
-
IAM-6781[9]: Password policy hints now show all policy conditions when creating a new user identity in the Advanced Identity Cloud admin console.
-
IAM-7615[9]: The Certificate Collector node now validates the value set in the HTTP Header Name for Client Certificate field based on the value selected in the Certificate Choice Method field.
-
IAM-8358[9][4]: Hosted account pages now display a New User button in the Users list view for delegated administrators.
-
OPENIDM-15771: You can now set locales in identity management scripts with the
_localeparameter. -
OPENIDM-17680: Advanced Identity Cloud now supports enumerations in string and number attributes of its identity schema. To make an attribute an enumeration, add
"enum" : [ "one", "two", "three" ]to the attribute. Advanced Identity Cloud requires create and update privileges to use one of the enumerated values. -
OPENIDM-19918: You can now choose whether synchronization detects identity array changes using ordered or unordered comparisons. Set the
comparisonconfiguration property in the schema. Unordered JSON array comparison ignores the order of elements and can negate the need for certain custom scripts within mappings. Relationship and virtual property array fields default to unordered comparisons. All other fields default to ordered comparisons. -
OPENIDM-20023: RCS communication with Advanced Identity Cloud can now use stricter authorization. Learn more in Secure RCS access and Migration dependent features.
Fixes
-
FRAAS-25256: Fixed an issue that was causing missing data in analytics dashboards.
-
IAM-1479[9]: Email field validation in the Advanced Identity Cloud admin console now runs only when typing stops or the field is unfocused.
-
IAM-7858[9]: Hosted account pages now use the access management
maxIdleExpirationTimevalue to prompt the You will be signed out soon modal. -
IAM-8382[9]: Fixed an issue in the bookmark app where the URL field validation stopped the Create Application button working the first time it was clicked.
-
IAM-8383[9]: Fixed an issue in the bookmark app where the URL field accepted ESV secrets.
-
IAM-8398[9]: Field labels positioned above a field now remain left aligned when autofill is triggered.
-
IAM-8441[9]: Fixed a display issue in the Advanced Identity Cloud admin console where connector servers and connector server clusters with long names went off the edge of the screen.
-
OPENAM-21783: Improved token management for OAuth 2.0 clients that override the Use Client-Side Access & Refresh Tokens setting. The OAuth 2.0
applicationsendpoint now correctly shows all tokens issued to these clients. Additionally, administrators can now successfully revoke any of the tokens issued to these clients. -
OPENDJ-11486[9]: Fixed an exception caused by identity management user queries with a filter containing wildcards and specific object classes.
May 2025
27 May 2025
Version 17584.6
Enhancements
-
ANALYTICS-1004[3]: Support for custom attributes and relationships in the organization entity for advanced reports.
-
OPENAM-23218: Legacy SAML 2.0 IDP attribute mapper scripts now have access to the
httpClientbinding. -
OPENAM-23710: Legacy SAML 2.0 IDP adapter scripts now have access to the
httpClientbinding.
16 May 2025
Version N/A
Key features
- Integrate with Microsoft 365 (FRAAS-21607)
-
Ping Identity introduces Microsoft 365 integration, a new add-on capability for Advanced Identity Cloud. The new Microsoft 365 application lets you set up SSO using the WS-Federation identity protocol.
Learn more in Register an SSO application.
13 May 2025
Version 17436.7
Enhancements
-
IAM-987: Added support for enums (drop-down lists) to hosted account pages.
-
IAM-1116: Added support for enums (drop-down lists) to the Advanced Identity Cloud admin console.
-
IAM-2103: Added support for enums (drop-down lists) to hosted journey pages.
-
IAM-6822: Added the ability to manage cookie domains in the Advanced Identity Cloud admin console.
-
IAM-7412: Updated the password policy feature in the Advanced Identity Cloud admin console. Added the ability to specify a minimum substring length between 3 - 64 to use when validating passwords against user attribute values. The default is still 5 characters, but can now be reduced to as few as 3 characters to catch shorter string matches.
-
IAM-7794[4]: Added support for using custom identity objects in the form builder.
-
IAM-7919: Improved color contrast ratio of the Delete Account button text when focused.
-
IAM-7934: Improved color contrast ratio of date fields when focused.
-
IAM-7957: Improved color contrast ratio of the Deselect button text when focused.
-
IAM-7966: Improved color contrast ratio of In Progress text.
-
IAM-8016[4]: Allow form authors to specify a user filter when dynamic enums are selected.
-
IAM-8085: Updated the Add a Parameter reports modal to use entity attributes for input.
Fixes
-
FRAAS-15518: Fixed issue that prevented localization of Session timed out message in certain locales.
-
FRAAS-24449: Enhanced the reliability of metrics collection under high-load conditions.
-
FRAAS-24990: Fixed an issue where requests to the
/monitoring/logsand/monitoring/logs/tailendpoints timed out after 15 seconds rather than the expected 60 seconds. -
IAM-5834: Fixed a double-encoding issue in the SAML app that affected IdP-initiated sign on.
-
IAM-6796: Jobs are now prevented from being scheduled with frequencies that cause invalid date errors.
-
IAM-7855: Fixed a typo in the help text returned when there are no results to display.
-
IAM-8237: Corrected floating labels in the date picker in the hosted journey pages.
-
IAM-8361: The Save button in the Edit Bookmark application is now inactive while checking if the ESV exists.
-
IAM-8364: Fixed issues in SAML end-to-end scenarios.
-
IAM-8378: Fixed an issue that stripped HTML elements from email templates.
-
IAM-8403: Fixed border focus location and floating label issues in Tag fields.
-
IAM-8434: Fixed an issue that prevented duplication of new themes that contain special characters.