Regular channel changelog version 20512.5
| This is a changelog entry for version 20512.5. You can review the changelog for all versions in Regular channel changelog. |
17 Feb 2026
Version 20512.5
Key features
- Identity Governance user-access graph (IGA-4051[1][2])
-
The user-access graph provides a graphical view of an end user’s access. It visualizes the links between an end user and their types of access, such as roles, applications, or entitlements. Identity Governance administrators can view graphs in the Advanced Identity Cloud admin console, and end users can view their own graph in the hosted account pages.
Learn more in View the user-access graph.
- Two-factor authentication report [1][3]
-
Advanced Reporting now lets you include information in your reports about the two-factor authentication (2FA) configurations of your end users. This includes the specific authentication methods each end user has registered and when each method was last used. This provides administrators with greater insight into second-factor adoption and helps ensure compliance with security policies.
Learn more in Report for two-factor authentication.
Enhancements
-
FRAAS-23284: RCS connections to Advanced Identity Cloud now have a default timeout value of
10000(10 seconds) for new tenants. Existing tenants retain the default timeout value of-1(no timeout). -
FRAAS-29829: Removed a reference to "PingOne Advanced Identity Cloud" from the
404 Not Founderror page. -
IAM-4464: Next-generation configuration provider scripts created through the journey editor now contain the default config for the selected node type.
-
IAM-9709: Updated the journey editor to make fewer network calls when saving a journey that contains page nodes.
Fixes
-
IAM-4345: Fixed an issue where vertical tabs were missing a hover state.
-
IAM-8033: Journey name field did not have a length check in place.
-
IAM-8226: When importing a journey, if you skip the download backup option but then return to it using the Previous link, it now completes the backup before offering the download.
-
IAM-9590: The message shown in the hosted pages for an unauthorized access attempt is now correctly centered on a single page.
-
IAM-9687: When you enter a valid ESV placeholder in the URL field of a bookmark application, the field is now immediately disabled and shows a delete icon to remove the placeholder.
-
IGA-4085[2][1]: Fixed an Identity Governance access request issue where glossary schema properties displayed an extra space for nonexistent icons.
-
IGA-3980[2][1]: Fixed an Identity Governance certification issue where the certification count on the Summary page didn’t include the
certificationTypequery parameter.