• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
UT Shield
Enterprise Technology
  • Home
  • News
    • Announcements
    • Authentication
    • Directory Services
    • Group and Role Management
    • Identity Management
    • Infrastructure
  • Solutions
    • Authentication
    • Directory Services
    • Group and Role Management
    • Identity Management
    • Tools
    • Other Solutions
  • Resources
    • Case Studies
    • Concepts
    • Directory Schema
    • Policies
    • Technical Docs
    • Terminology
    • Vendor Guide
  • About
    • Metrics
    • Opportunities
    • Roadmap
    • Values
  • Help

Identity Management Release Notes

Below are release notes for IAM services which fall under the Identity Management category.

May 21, 2025, Filed Under: Identity Management, midPoint Release Notes

Release Notes – midPoint – Release 2025.3.2

On Wednesday, May 20, 2025 the IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information. Team released version 2025.3.2 of midPoint, implementing the following changes:

  • A new task to remove Grouper Outbound – Grouper Source Database shadows that do not have the Grouper Subject Role.
  • Grouper connector update from version 1.2.0.0 to 1.2.0.1.
  • Adjust auto-vacuum settings to 0.01 so that auto-vacuuming occurs more often.
  • Remove the explicit fetch from Grouper Groups Members attribute.
  • Adjust the midPoint automated tests to include a delay to allow for syncing.
  • General service updates.

April 15, 2025, Filed Under: Identity Management, midPoint Release Notes

Release Notes – midPoint – Release 2025.3.1

On Tuesday, April 15, 2025 the IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information. Team released version 2025.3.1 of midPoint, implementing the following changes:

  • Update to the midPoint automated tests.
  • Scheduled start time change to the ADAD Active Directory (AD) is a directory service from Microsoft which implements Internet standard directory and naming protocols. See Austin Active Directory (Austin AD) in the service catalog for the University’s local implementation. User Reconciliation.
  • Gerneral service updates.

April 2, 2025, Filed Under: Identity Management, midPoint Release Notes

Release Notes – midPoint – Release 2025.3.0

On Wednesday, April 2, 2025 the IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information. Team released version 2025.3.0 of midPoint, implementing the following changes:

  • Upgrade to midPoint v4.8.7.
  • Increase the pod configuration from one to three.
  • Safe-guard resources so they cannot be deleted through the user interface.
  • Remove caching code from the midPoint system configuration.
  • Added checking for nodes as part of the automated tests.
  • Increase the LDAPLDAP Lightweight Directory Access Protocol (LDAP) is a set of protocols for accessing information directories based on the standards contained within the X.500 standard, but is significantly simpler. and ADAD Active Directory (AD) is a directory service from Microsoft which implements Internet standard directory and naming protocols. See Austin Active Directory (Austin AD) in the service catalog for the University’s local implementation. resource timeout settings.
  • Github actions clean up.
  • Update ADOT XRay settings.

February 21, 2025, Filed Under: Identity Management, midPoint Release Notes

Release Notes – midPoint – Release 2025.2.4

On Thursday, February 20, 2025 the IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information. Team released version 2025.2.4 of midPoint, implementing the following changes:

  • Task schedule misfire actions were added to task schedule configurations.
  • Skip processing a specific test user in non-production testing environments.
  • General service updates.

February 18, 2025, Filed Under: Identity Management, TIM Release Notes

Release notes – uTexas Identity Manager – TIM 2025.1.0

On Tuesday, February 18, 2025 the IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information. Team released version 2025.1.0 of the uTexas Identity Manager (TIMTIM The uTexas Identity Manager (TIM) is the University’s identity manager. See uTexas Identity Manager (TIM) in the service catalog for more information.) which implemented the following changes:

  • Added TEE affiliationAffiliation An affiliation is an attribute which reflects, at a high level, how an individual is related to the university. At any point in time, an individual may have no defined relationship, one defined relationship, or many defined relationships with the university. For example, and individual may be a current student, a future faculty member, a former employee, or all three. for Texas Executive Education(TEE) participants.
  • Increased authorizationAuthorization Authorization refers to the act of determining whether an authenticated user is allowed to access a specific resource or take a specific action. For more information, see our Concepts page. limit to allow more requests.
  • Minor bug fixes.

  • Page 1
  • Page 2
  • Page 3
  • Interim pages omitted …
  • Page 19
  • Go to Next Page »

Primary Sidebar

Recent News

  • Release Notes – uTexas Enterprise Directory – Release 20250604095505
  • Release Notes – midPoint – Release 2025.3.2
  • Release Notes – IGA Infrastructure – Release 2025.2.2
  • Release Notes – SailPoint IdentityIQ (IIQ) – Version 2025.2.0
  • Release Notes – Enterprise Group Services – Release 2025.2.3

Footer

Home
News
Solutions
Resources
About
Help
Authentication
Directory Services
Group and Role Management
Identity Management
Tools
Other Solutions
Alerts & Outages
Campus IT Policies
Campus Solutions
Enterprise Technology
Information Security Office (ISO)
IT@UT
Enterprise Technology Logo

P.O. Box 7407
Austin, TX 78713-7407
+1 512-475-9400
help@utexas.edu

UT Home | Emergency Information | Site Policies | Web Accessibility | Web Privacy | Adobe Reader

© The University of Texas at Austin 2025