• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
UT Shield
Enterprise Technology
  • Home
  • News
    • Announcements
    • Authentication
    • Directory Services
    • Group and Role Management
    • Identity Management
    • Infrastructure
  • Solutions
    • Authentication
    • Directory Services
    • Group and Role Management
    • Identity Management
    • Tools
    • Other Solutions
  • Resources
    • Case Studies
    • Concepts
    • Directory Schema
    • How do I…?
    • Policies
    • Technical Docs
    • Terminology
    • Vendor Guide
  • About
    • Metrics
    • Opportunities
    • Roadmap
    • Values
  • Help

News

February 13, 2025, Filed Under: IGA Infrastructure Release Notes, Infrastructure

Release Notes – IGA Infrastructure – Release 2025.1.6

On Thursday, February 13, 2025 the IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information. Team released version 2025.1.6 of the IGAIGA Identity Governance and Administration (IGA) refers to a set of processes and technologies used by organizations to manage and control user access to resources and information within their systems. Infrastructure, implementing the following change:

  • General service updates.

February 12, 2025, Filed Under: IGA Infrastructure Release Notes, Infrastructure

Release Notes – IGA Infrastructure – Release 2025.1.5

On Wednesday, February 12, 2025 the IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information. Team released version 2025.1.5 of the IGAIGA Identity Governance and Administration (IGA) refers to a set of processes and technologies used by organizations to manage and control user access to resources and information within their systems. Infrastructure, implementing the following change:

  • Upgrade the AWS Elastic Kubernetes Service (EKS) cluster from version 1.29 to version 1.30.

February 5, 2025, Filed Under: Identity Management, midPoint Release Notes

Release Notes – midPoint – Release 2025.2.3

On Wednesday, February 5, 2025 the IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information. Team released version 2025.2.3 of midPoint, implementing the following changes:

  • Decrease the number of pods from four to one.
  • Update pod worker settings.
  • Install Auto-instrumentation for AWS Xray.
  • General service updates.

January 28, 2025, Filed Under: Authentication, Enterprise Authentication Changelog

Change Log – Enterprise Authentication – v20250115145930

  • Configured OIDCOIDC OpenID Connect 1.0 (OIDC) is an authentication layer built on OAuth 2.0 where the identity provider that runs the authorization server also holds the protected resource that the third-party application aims to access. specification-compliant logout endpoints.
  • Configured OIDC specification-compliant logout redirects.

January 22, 2025, Filed Under: IGA Infrastructure Release Notes, Infrastructure

Release Notes – IGA Infrastructure – Release 2025.1.4

On Wednesday, January 22, 2025 the IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information. Team released version 2025.1.4 of the IGAIGA Identity Governance and Administration (IGA) refers to a set of processes and technologies used by organizations to manage and control user access to resources and information within their systems. Infrastructure, implementing the following change:

  • Installation of the AWS Distro for OpenTelemetry (ADOT) Java Auto-Instrumentation Agent for use with X-Ray services.
  • General service updates.
  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • Interim pages omitted …
  • Page 48
  • Go to Next Page »

Primary Sidebar

Recent News

  • Release Notes – Enterprise Authentication – Release 2026.2.0
  • Release Notes – ADS Infrastructure – Release 2026.1.4
  • Release Notes – Enterprise Group Services – Release 2026.1.2
  • Release Notes – midPoint – Release 2026.1.4
  • Release Notes – IGA Infrastructure – Release 2026.1.3

Footer

Home
News
Solutions
Resources
About
Help
Authentication
Directory Services
Group and Role Management
Identity Management
Tools
Other Solutions
Alerts & Outages
Campus IT Policies
Campus Solutions
Enterprise Technology
Information Security Office (ISO)
IT@UT
Enterprise Technology Logo

P.O. Box 7407
Austin, TX 78713-7407
+1 512-475-9400
help@utexas.edu

UT Home | Emergency Information | Site Policies | Web Accessibility | Web Privacy | Adobe Reader

© The University of Texas at Austin 2026