• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
UT Shield
Enterprise Technology
  • Home
  • News
    • Announcements
    • Authentication
    • Directory Services
    • Group and Role Management
    • Identity Management
    • Infrastructure
  • Solutions
    • Authentication
    • Directory Services
    • Group and Role Management
    • Identity Management
    • Tools
    • Other Solutions
  • Resources
    • Case Studies
    • Concepts
    • Directory Schema
    • How do I…?
    • Policies
    • Technical Docs
    • Terminology
    • Vendor Guide
  • About
    • Metrics
    • Opportunities
    • Roadmap
    • Values
  • Help

News

November 12, 2024, Filed Under: Authentication, Enterprise Authentication Changelog

Change Log – Enterprise Authentication – IDP v5 Upgrade

  • Upgraded to the InCommon Trusted Access Platform (TAPTAP The InCommon Trusted Access Platform (TAP) is an identity and access management suite of software.) Identity Provider (IdPIdP An Identity Provider (IdP) is a software tool or service that offers user authentication as a service. The IdP manages the user's primary authentication credentials and issues assertions derived from those credentials. At UT Austin, the primary IdP used to authenticate the UT EID and EID Password is Enterprise Authentication, which is managed by the IAM Team. For more information, see our Concepts page.) version 5.

October 23, 2024, Filed Under: IGA Infrastructure Release Notes, Infrastructure

Release Notes – IGA Infrastructure – Release 2025.1.2

On Wednesday, October 23, 2024 the IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information. Team released version 2025.1.2 of the IGAIGA Identity Governance and Administration (IGA) refers to a set of processes and technologies used by organizations to manage and control user access to resources and information within their systems. Infrastructure, implementing the following change:

  • Remove legacy DB cluster

October 9, 2024, Filed Under: IGA Infrastructure Release Notes, Infrastructure

Release Notes – IGA Infrastructure – Release 2025.1.1

On Wednesday, Octobr 9, 2024 the IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information. Team released version 2025.1.1 of the IGAIGA Identity Governance and Administration (IGA) refers to a set of processes and technologies used by organizations to manage and control user access to resources and information within their systems. Infrastructure, implementing the following change:

  • Remove legacy DB exports from finalization stack

October 3, 2024, Filed Under: Enterprise Group Services Release Notes, Group and Role Management

Release Notes – Enterprise Group Services – Release 2025.2.0

On Wednesday, October 2, 2024 the IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information. Team released the following:

  • Grouper upgrade to version v4.14.2.

September 25, 2024, Filed Under: Identity Management, midPoint Release Notes

Release Notes – midPoint – Release 2025.1.0

On Wednesday, September 25, 2024 the IAMIAM Identity and Access Management (IAM) is a set of policies, processes, and technologies designed to ensure that the right individuals (identities) have the right access to resources within an organization. IAM involves managing and securing digital identities, controlling access to systems and data, and maintaining the confidentiality, integrity, and availability of information. Team released version 2025.1.0 of midPoint, implementing the following changes:

  • Created task to resume suspended sub-tasks.
  • Removed old certificate.
  • Disabled emergency login in non-sandbox environments.
  • Upgraded lxml.
  • Other general service updates.

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 9
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • Interim pages omitted …
  • Page 45
  • Go to Next Page »

Primary Sidebar

Recent News

  • Release Notes – SailPoint IdentityIQ (IIQ) – Version 2026.1.1
  • Release Notes – Enterprise Group Services – Release 2026.1.1
  • Release Notes – midPoint – Release 2026.1.2
  • Release Notes – IGA Infrastructure – Release 2026.1.1
  • Release Notes – Guest Authentication – Release 2026.1.0

Footer

Home
News
Solutions
Resources
About
Help
Authentication
Directory Services
Group and Role Management
Identity Management
Tools
Other Solutions
Alerts & Outages
Campus IT Policies
Campus Solutions
Enterprise Technology
Information Security Office (ISO)
IT@UT
Enterprise Technology Logo

P.O. Box 7407
Austin, TX 78713-7407
+1 512-475-9400
help@utexas.edu

UT Home | Emergency Information | Site Policies | Web Accessibility | Web Privacy | Adobe Reader

© The University of Texas at Austin 2025