arrow-left

All pages
gitbookPowered by GitBook
1 of 10

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Immuta LTS Changelog

The table below outlines feature changes from the previous LTS release to the current one.

hashtag
Deprecations

The table below outlines deprecations from the previous LTS release to the current one.

Immuta v2024.2 Release Notes

hashtag
Immuta v2024.2.20

Immuta v2024.2.20 was released June 27, 2025.

hashtag
Bug fix

When a table was changed to or recreated as a view (or vice versa), schema detection did not track those changes. This issue caused policy application failures, since statements such as ALTER TABLE would fail when applied to a view.

hashtag
Immuta v2024.2.19

Immuta v2024.2.19 was released May 16, 2025.

hashtag
Bug fix

When users attempted to apply tags to data source columns that contained a | character in their column name, they received an error stating that the specified column didn't exist.

hashtag
Known issue

The version badge on the Immuta login page for this release displays 2024.2.18 instead of 2024.2.19.

hashtag
Immuta v2024.2.18

This release was skipped.

hashtag
Immuta v2024.2.17

Immuta v2024.2.17 was released May 9, 2025.

hashtag
Behavior change

Disabled data source behavior for Azure Synapse Analytics, Databricks Unity Catalog, Google BigQuery, Redshift, and Snowflake integrations: Immuta will remove all policies on disabled data sources for these integrations.

  • Previous behavior: Disabling a data source triggered a lockdown policy, which revoked all users’ access until the data source was either deleted from Immuta or re-enabled.

  • New behavior: Disabling a data source will remove existing Immuta policies and prevent Immuta from adding new policies until the data source is re-enabled. Immuta policies will be removed from currently disabled data sources. For view-based integrations (Azure Synapse Analytics, Google BigQuery, and Redshift), if a user disables an object in Immuta, the Immuta-created view will be deleted.

To enable this behavior for your tenant, add the following snippet to the Advanced Settings section on the app settings page:

hashtag
Bug fixes

  • Databricks Unity Catalog integration: Users encountered the following error when applying a data policy on a data source after setting up the integration: [INSUFFICIENT_PERMISSIONS] Insufficient privileges: Table '__immuta_user' does not have sufficient privilege to execute because the owner of one of the underlying resources failed an authorization check. This release includes an update to the integration configuration script to grant the Immuta service principal the required privilege.

  • Fixes to address a race condition in the V1 API DELETE /dataSource/{dataSourceId} endpoint that caused Snowflake policies to be out-of-sync.

hashtag
Immuta v2024.2.16

Immuta v2024.2.16 was released March 27, 2025.

hashtag
Bug fixes

  • Snowflake integration upgrade: Fixed issue that caused validation failures when the casing of the IMMUTA_SYSTEM_ACCOUNT login name was different from the credentials provided.

  • Vulnerabilities addressed:

    • CVE-2024-6827

hashtag
Immuta v2024.2.15

Immuta v2024.2.15 was released March 17, 2025.

hashtag
Bug fixes

  • Users could not delete a tag that had been associated with a framework unless they deleted the framework.

  • After an Immuta upgrade, there were discrepancies between Impala FeatherLite hashing data policies.

  • In Databricks Unity Catalog, policies were not being properly applied to columns with names that included special characters.

hashtag
Immuta v2024.2.14

Immuta v2024.2.14 was released January 31, 2025.

hashtag
Bug fixes

  • Schema monitoring failed in Snowflake integrations that used an Okta proxy in the additional connection string options field.

  • Fixes to reduce the file size of the system status bundles.

  • Vulnerability addressed: CVE-2025-22150

hashtag
Immuta v2024.2.13

Immuta v2024.2.13 was released January 22, 2025.

hashtag
Update

Databricks Unity Catalog integration: This release includes updates to the Databricks Unity Catalog integration to use Databricks paginated APIs, since Databricks will deprecate all unpaginated APIs in February 2025.

In versions older than 2024.2.13, Immuta uses many unpaginated Databricks APIs for policy enforcement. Performance will be impacted for customers on self-managed versions that still rely on those deprecated APIs, as they will be severely rate limited.

hashtag
Bug fix

The Immuta Enterprise Helm Chart was not correctly deploying a load balancer for the right service.

hashtag
Immuta v2024.2.12

Immuta v2024.2.12 was released December 19, 2024.

hashtag
Bug fixes

  • Data source health status was updated with the wrong handler.

  • Fixes to address Snowflake integration validation errors that occurred after an upgrade.

  • The exclude query text advanced configuration option failed when using the Starburst (Trino) integration without Elasticsearch.

hashtag
Immuta v2024.2.11

Immuta v2024.2.11 was released December 12, 2024.

hashtag
Bug fixes

  • Data source health status was updated with the wrong handler.

  • Vulnerabilities addressed:

    • CVE-2024-21538

hashtag
Immuta v2024.2.10

Immuta v2024.2.10 was released November 21, 2024.

hashtag
Bug fixes

  • Performance improvements to the policy page.

  • The /api/v2/data endpoint was not properly adding a data source to the domain specified by the domainCollectionId attribute.

  • Vulnerability addressed: CVE-2024-21534

hashtag
Immuta v2024.2.9

Immuta v2024.2.9 was released October 31, 2024.

hashtag
Bug fixes

  • The /api/v2/data endpoint was not properly adding a data source to the domain specified by the domainCollectionId attribute.

  • OpenID Connect identity providers that had HTTP_PROXY, HTTPS_PROXY, or NO_PROXY environment variables configured failed with connection errors.

hashtag
Immuta v2024.2.8

Immuta v2024.2.8 was released September 27, 2024.

hashtag
Bug fix

Various SCIM API calls returned a 404 status, even though the updates were successful.

hashtag
Immuta v2024.2.7

Immuta v2024.2.7 was released September 26, 2024.

hashtag
New features and enhancements

Authentication change to accommodate Snowflake moving away from password-only authentication: This release includes updates to our integration setup script to accommodate Snowflake beginning to transition away from password-only authentication for new accounts. When configuring an integration manually for a new Snowflake account, Immuta provides an updated manual setup script that permits password-only authentication by differentiating it as a legacy service with an additional parameter. Existing integrations will continue to function as-is.

Users on Immuta versions 2024.2.6 and older must use the manual setup option to configure the Snowflake integration. To use the automatic setup option to configure the Snowflake integration, users must upgrade to 2024.2.7.

hashtag
Bug fixes

  • The authorizations attribute will now be excluded from the if the requesting user does not have the USER_ADMIN Immuta permission.

  • Users could not select Immuta as their IAM on the login screen and were only able to see their LDAP IAM in the dropdown menu.

  • Fixes to remove orphaned handler objects.

hashtag
Immuta v2024.2.6

Immuta v2024.2.6 was released September 11, 2024.

hashtag
Bug fixes

  • Resolved an issue that prevented users from being able to subscribe to Redshift data sources.

  • The following attributes will now be excluded from the if the requesting user does not have the USER_ADMIN Immuta permission:

    • bimAuthorizations

hashtag
Immuta v2024.2.5

Immuta v2024.2.5 was released September 6, 2024.

hashtag
Bug fixes

  • Updated encryption of information related to REST catalog passwords in the system bundle.

  • Existing Snowflake and Redshift integrations did not migrate properly after an upgrade.

  • Users encountered a JSON parsing error when querying Redshift data sources if policies were applied that contained backslashes in user attributes.

hashtag
Bug fix with breaking API change

Only users with the permission are authorized to use the endpoint; users without that permission will be blocked and get a 403 status returned.

hashtag
Immuta v2024.2.4

Immuta v2024.2.4 was released August 9, 2024.

hashtag
Enhancement

Databricks Unity Catalog ARRAY, MAP, and STRUCT type columns support masking with NULL.

hashtag
Bug fixes

  • In some instances, data and subscription policies remained in a pending state and were not applied to data in the remote platform.

  • Addressed issues that prevented Starburst (Trino) from working properly with the query engine disabled.

  • Fix to address the New tag being incorrectly applied to data sources and locking down access to data.

hashtag
Immuta v2024.2.3

Immuta v2024.2.3 was released July 26, 2024.

hashtag
Enhancement

Previously, data source tasks were created for all events discovered by schema monitoring. Now, the following events will only have data source tasks created if there is a policy targeting the auto-applied New tag:

  • Column added

  • Column type changed

  • Data source created

hashtag
Bug fixes

  • Immuta would allow for the data dictionary to be updated to empty, but this empty state was not supported by backend functions.

  • External user IDs failed to save if the username contained a psql slash command ("\e", "\t", "\q", etc.).

  • Data sources in view-based integrations were sometimes locked down and inaccessible to users after being registered in Immuta, even if no policies applied to them.

hashtag
Immuta v2024.2.2

Immuta v2024.2.2 was released June 25, 2024.

hashtag
Enhancement

Comply with column length and precision in a Snowflake masking policy: Snowflake is soon requiring the outputs of masked columns to comply with the length, scale, and precision of what the Snowflake columns require. To comply with this Snowflake behavior change, Immuta truncates the output values in masked columns to match the Snowflake column requirements so that users' queries continue to complete successfully.

hashtag
Bug fixes

Vulnerabilities addressed:

  • CVE-2024-4068

  • CVE-2024-4067

hashtag
Immuta v2024.2.1

Immuta v2024.2.1 was released June 7, 2024.

hashtag
Enhancements

  • Trino universal audit model available with Trino 435 using the Immuta Trino plugin 435.1: For customers that are using EMR 7.1 with Trino 435.1, and have audit requirements, the Immuta Trino 435.1 plugin now supports audit in universal audit model. The Immuta Trino 435.1 plugin audit information is on par with Immuta Trino 443 plugin. The Immuta Trino 435.1 plugin is supported on SaaS and 2024.2 and later.

  • Data owners can now see audit events for the data sources that they own without having the AUDIT Immuta permission: Data owners can see query events for their data sources on the audit page, data overview page, data source pages, and the data source activity tab. They can also inspect Immuta audit events on the audit page and activity tab for the data sources they own. This enhancement gives data owners full visibility of activity in the data sources they own.

hashtag
Bug fixes

  • UI performance issues

  • Fixes to address issues that caused Immuta to fail passing the SSL cert supplied by customers using an external metadata database.

  • IAM integrations that had SCIM enabled did not support backslashes \ in usernames.

hashtag
Immuta v2024.2.0

Immuta v2024.2.0 was released May 10, 2024.

hashtag
New features

hashtag

Immuta Detect is a tool that monitors your data environment and provides analytic dashboards in the Immuta UI based on audit information of your data use.

  • : Immuta Detect monitors help you surface non-compliant data combinations and maintain data availability through data platform configuration changes. Monitors can notify you when user activity metrics exceed your intended operating thresholds. Monitors work with query tags, query execution outcomes, and Immuta Discover classification sensitivities when enabled.

  • : For a query that joins tables, Immuta uses the same classification rules applied to tables and applies those rules to columns of the query. Immuta applies a new set of classification tags to the query columns and calculates sensitivity for the query event in the audit record. These query classification tags are not included on the table's data dictionary.

  • : Over 90 audit events are captured and can be exported to S3 or ADLS Gen2. See the full list of supported events on the

hashtag
Immuta Discover

  • : Native SDD is available for Snowflake and Databricks in general availability, and Starburst (Trino) and Redshift in private preview. Native SDD automatically discovers and tags your data based on the identifiers it matches but, unlike non-native SDD, it does not persist or move any of your data. It is enabled by default.

    • SDD tag context: Native SDD leaves legacy SDD tags in place when they are not found upon a subsequent re-scan of a data source. Customers who begin using native SDD can see results with no impact to prior legacy SDD tags. See the .

hashtag
Immuta Secure

  • : In addition to read operations, Immuta's Starburst (Trino) and Amazon S3 integrations now support fine-grained access permissions for write operations.

  • : Row- and column-level policies can now account for purposes and projects for additional security. With this policy configuration, a user will only be able to view the data the policy applied to if they are acting under a certain purpose and that data is within their current project. Purpose exception policies ensure data is only being used for the intended purposes.

  • Support protecting more than 10,000 objects with Unity Catalog row- and column- level policies: Users can now mask more than 10,000 columns or tables with row filters, removing the previous limitation in the Unity Catalog integration. This enhancement provides greater flexibility and scalability for data masking operations, allowing users to effectively secure sensitive data across larger datasets.

hashtag
User experience updates

  • Improved user experience for managing users, data sources, and policies in public preview: This deployment includes significant user experience updates focused on enhancing Immuta's key entities: users, data sources, and policies.

    • The People section has a more intuitive experience with notable changes. Users and groups have been split into two separate tabs. The first tab provides an overview of a user or group, while the second tab contains detailed settings, such as permissions, attributes, and associated groups.

      Another enhancement in the People section is the new Attributes page, which centralizes all information about an attribute, including the users or groups it applies to.

hashtag
Dark mode and other usability updates

  • The new user profile page separates information better and makes it easier to understand.

  • Keyboard shortcuts are now available for some common functions. Keep an eye out for in-app guidance that helps with how to use them.

  • The account menu is wider for better readability and now has an option to toggle between light and dark mode. By default, Immuta still uses your browser settings.

hashtag
Deprecations and breaking changes

hashtag
Deprecation announcements

Deprecated items remain in the product with minimal support until their end of life date.

Feature
Deprecation notice
End of life (EOL)

hashtag
Removed features (EOL)

Feature
Deprecation notice
End of life (EOL)

hashtag
Breaking changes

  • Change to POST /tag/{modelType}/{modelId} endpoint: The POST /tag/{modelType}/{modelId} endpoint (which adds tags to models that can be tagged, such as data sources and projects) can only apply tags that exist to these models. This update presents one breaking change: A 404 status will now be returned with the tag(s) that were not valid instead of a 200 status, and no tags will be processed if any invalid tags are found.

  • Change to

hashtag
v2024.2 migration notes

  • You must be on Immuta version 2022.5 or newer to migrate directly to 2024.2.

  • Integrations API: If you did not have integrations API turned on prior to 2024.2.0, when the tenants are restarted after upgrading, the system will perform a short migration of the integrations from the global configuration to the new integrations bometadata tables in support of integrations API.

CVE-2025-1302

  • CVE-2025-27152

  • Vulnerabilities addressed:
    • CVE-2024-57065

    • CVE-2024-6827

    • CVE-2025-25200

    CVE-2023-25399

  • CVE-2024-3651

  • CVE-2024-37891

  • CWE-79

  • Added functionality that allows users to configure TLS server ciphers outside the default ciphers used by the Immuta deployment.

  • If two integrations existed and one of them was a Databricks Unity Catalog integration configured with proxyOptions that did not include username or password fields, the Immuta UI failed to render properly.

  • Vulnerabilities addressed:

    • CVE-2024-41818

    • CVE-2024-3651

    • CVE-2024-45801

    • CVE-2024-21534

    • CVE-2024-4067

  • When mapping users from Immuta to Databricks in the Databricks Spark integration, Immuta was not honoring case insensitivity of usernames.

  • Fix to address schema monitoring and column detection errors in Redshift integrations.

  • Vulnerability addressed: CVE-2024-35255

  • iamAuthorizations

  • authorizations

  • Fixed an issue that caused Google BigQuery data sources to get stuck in an unhealthy state.
  • Masking policies failed to apply to complex data type columns in Databricks if property names within the struct included special characters.

  • Vulnerabilities addressed:

    • CVE-2024-37890

    • CVE-2024-39338

    • CWE-29

  • Masking Snowflake OBJECT type columns with NULL failed.

  • CVE-2024-6345 addressed

  • Subscription policies that included variables (@host, @database, @schema, @table) caused UI performance issues.

  • Immuta was not escaping or encoding special backslash characters (/, \) in usernames, which resulted in bad API requests.

  • Deleting and re-enabling a Redshift integration caused issues for data sources with custom schema/table names and formats.

  • Databricks Unity Catalog integration configuration failed to save if Oauth token passthrough was used as the authentication method.

  • Fixes to address an issue that caused Redshift data source subscriptions to fail if users were subscribed to a large number of them.

  • .
    : Immuta comes preconfigured with a bundle of classification frameworks for use out-of-the-box once endorsed by your organization's admins. These frameworks are designed by Immuta’s Legal Engineering and Research Engineering teams and informed by data privacy regulations and security standards: GDPR, CCPA, GLBA, HIPAA, PCI, and global best practices. They are a starting point for companies to customize to their own classification, security, and risk policies.
  • OAuth M2M support for Databricks Unity Catalog: Immuta supports establishing connections to Databricks using OAuth Machine-to-Machine (M2M) authentication. This feature enhances security and simplifies the process of integrating Databricks with Immuta, leveraging the robust capabilities of OAuth M2M authentication.

  • Faster query performance with Snowflake memoizable functions in public preview: When a policy is applied to a column, Immuta now uses Snowflake memoizable functions to cache the result of common lookups in the policy encapsulated in the called function. Subsequently, when users query a column with the applied policy, Immuta leverages the cached result, which significantly enhances query performance. Contact your customer success manager for more details.

  • Disable external usernames with invalid Databricks identities: Databricks user identities for Immuta users will now be automatically marked as invalid when the user is not found during policy application. This will prevent them from being affected by Databricks policy until manually marked as valid again in their Immuta user profile. This change drastically improves syncing performance of subscription policies for Databricks Unity Catalog integrations when Immuta users are not present in the Databricks environment.

  • Disable k-anonymization by default and allow users to opt-in: When a k-anonymization policy is applied to a data source, the columns targeted by the policy are queried under a fingerprinting process that generates rules that enforce the k-anonymity. The results of this query, which may contain data that is subject to regulatory constraints such as GDPR or HIPAA, are stored in Immuta's metadata database.

    To ensure this process does not violate your organization's data localization regulations, you need to first activate this masking policy type before you can use it in your Immuta tenant. To enable k-anonymization, adjust the setting on the Immuta app settings page. If you have existing k-anonymization policies, those policies will not be affected by this change.

  • Collibra PII assignments: When pulling personally identifiable information (PII) from Collibra, Immuta now includes and differentiates true and false value assignments as Personally Identifiable Information.true and Personally Identifiable Information.false to more accurately reflect how PII is set in Collibra.

  • Integrations API: The Integrations API will be enabled by default when users upgrade to 2024.2. With this feature, the Integrations UI is in a new section of the product. Also, when creating Snowflake integrations, tag extraction will no longer be an option. Users can set up tag extraction and manage existing Snowflake external catalogs via the External Catalog section of the Immuta app settings page.

  • Running table statistics only if required (instead of by default): Table statistics consist of row counts, identification of high cardinality columns, and a sample data fingerprint. Immuta needs to collect this information in order to support the following data access policy types:

    • Column masking with randomized response

    • Column masking with format preserving masking

    • Column masking with k-anonymization

    • Column masking with rounding

    • Row minimization

    Prior to this change, table statistics would be collected for every newly onboarded object by default, except if the object had a Skip_Stats tag applied. Post this change, table statistics are now only collected on a data object once they are required (i.e., if one of the above-mentioned policy types is applied). Even then, the Skip_Stats tag continues to be respected. This change results in performance improvements, as the number of standard operations during data object onboarding is significantly reduced.

  • Alation custom fields integration: In addition to Alation standard tags, Immuta’s Alation integration now also supports pulling information from Alation custom fields as tags into Immuta.

  • The Data Sources section has been completely redesigned to offer a more efficient search and filter experience. Users can preview details of a data source through expandable rows on the list and access bulk actions for data sources more easily.

  • The Policy section includes an updated list with improved search and filter capabilities. Additionally, a policy detail page allows users to view comprehensive policy information, take action, edit policies, and see a list of targeted data sources.

  • “Pending” policy state: A new Pending policy state indicates when background jobs are running to update permissions after a policy is created or changed. Once the Pending state changes to Active, all policy changes have been enforced on affected data sources.

  • Color coding for data source health: The health status for each data source on the data source list page now uses color coding to provide a visual for users so they can quickly determine whether they should take action related to the health of data sources. Additionally, unhealthy data sources are ranked at the top of the list on the data source page to ensure that when users log in to Immuta they are aware that unhealthy data sources exist in the system. Prior to this change, users had to click through all data source pages or had to explicitly set up a filter to achieve the same behavior.

  • Updates to button labels: Two buttons have been renamed to align their labels more closely with their functionality.

    • The "Sync Native Policies" button has been renamed to "Sync Data Policies" to better reflect its function.

    • The "Refresh Native Views/Policies" button has been renamed to "Refresh Native Views/Data Policies" for improved accuracy.

  • Browser tabs tell you which page you’re on, instead of all being labeled “Immuta Console.” A new, adaptive favicon allows you to still tell that it’s Immuta at-a-glance, whether you’re in light or dark mode.
  • Fix to address a UI issue that led customers to believe that disabled users were not getting their access revoked. The UI has been updated and disabled users are now being filtered out from the data source members tab.

  • dbt integration

    2024.1

    2024.2

    Databricks Spark with Unity Catalog support

    2024.1

    2024.2

    Non-Unity Databricks SQL view-based integration

    2023.3

    2024.2

    Discussions tab

    2023.3

    2024.2

    HIPAA expert determination and templated policies (HIPAA and CCPA)

    2023.3

    2024.2

    Interpolated WHERE clause

    2023.2

    2024.2

    Legacy Amazon S3 proxy

    2023.3

    2024.2

    Legacy Starburst (Trino) integration

    2023.2

    2024.2

    MySQL proxy connector

    2024.1

    2024.2

    Query editor (now turned off by default)

    2023.3

    Starting to remove with 2024.2

    Single Node Docker installation

    2023.2

    2024.2

    Legacy Snowflake view-based integration (Snowflake integration without Snowflake Governance features)

    2023.2

    2024.2

    Tableau connector

    2023.3

    2024.2

    POST /tag/column/{datasource_id}_{column_name}
    endpoint
    : The
    POST /tag/column/{datasource_id}_{column_name}
    endpoint (which adds tags to columns on data sources) can only tag existing columns on data sources. It does this by checking the dictionary associated with the data source to see if the desired column exists on the data source. This deployment introduces two breaking changes:
    • Column does not exist 404: When the column does not exist on the data source, a 404 status is now returned instead of a 200.

    • Dictionary does not exist 404: When an associated dictionary does not exist on the specified data source (that you have access to add tags to), a 404 status is now returned instead of a 403.

  • Change to POST /project: Users will receive a 422 status error instead of a 400 status error when trying to create a new project name that would result in a database conflict on the project's unique name.

  • Change to POST /api/v2/data response: creating will not be returned in the response when using this endpoint the first time; the response will just include bulkId and connectionString. However, when updating a data source using POST /api/v2/data, the response will include creating: [] (with no data source names inside the array).

  • Derived data sources (and CREATE_DATA_SOURCE_IN_PROJECT permission)

    2024.2

    2024.4

    Managing the default subscription policy

    2024.2

    2024.4

    Legacy sensitive data discovery (SDD)

    2023.3

    2024.4

    Amazon EMR Spark & Hive proxy connector

    2023.2

    2024.2

    Azure Data Lake Storage proxy connector

    2023.3

    2024.2

    Azure SQL Proxy Connector

    2023.3

    2024.2

    Data source expiration dates

    2023.2

    GET /bim/group response
    GET /bim/user response
    CREATE_DATA_SOURCE
    POST api/v2/data
    Immuta Detect
    Query monitoring with webhook notifications for Databricks, Snowflake and Starburst (Trino) in public preview
    Dynamic query classification in private preview
    Universal audit model
    Native sensitive data discovery (SDD)
    Migrate legacy to native SDD page for more details
    Write policies for Starburst (Trino) and Amazon S3 in private preview
    Project-scoped purpose exceptions for Snowflake and Databricks Unity Catalog integrations in public preview

    2024.2

    Universal audit model (UAM) page
    Built-in classification frameworks in private preview

    Releases

    This section includes release notes, features in preview, a support matrix, and the long term support model description.

    hashtag

    This page includes a list of new features, enhancements, bug fixes, and migration notes.

    Immuta Release Lifecycle

    hashtag
    Release Lifecycle Schedule

    Version
    General availability date
    End of support date
    End of extended support date
    {
    "statusCode": 404,
    "error": "Not Found",
    "message": "Data Source {datasourceId} does not have a column named '{columnName}' (case-sensitive)."
    }
    featureFlags:
      noLockdownOnDisable: true
    {
        "statusCode": 403,
        "error": "Forbidden",
        "message": "You must have the \"CREATE_DATA_SOURCE\" permission."
    }
    {
      "statusCode": 404,
      "error": "Not Found",
      "message": "Tags with the names [`country`, `sensitive`] do not exist."
    }
    hashtag
    Immuta release lifecycle

    This page includes a description of Immuta's release lifecycle model.

    hashtag
    Immuta LTS changelog

    This page includes illustrations of changes in the product over the last 12 months and since the last LTS release.

    hashtag
    Immuta support matrix overview

    This page includes an overview of the data platforms, identity managers, external catalogs, and web browsers that Immuta supports.

    hashtag
    Immuta CLI release notes

    This page includes a list of new features, enhancements, and bug fixes for the Immuta CLI.

    hashtag
    Immuta image digests

    This page includes a list of image digests to verify the integrity of Immuta images that you pull.

    hashtag
    Preview features

    This section includes an overview of Immuta's feature preview program and a list of features currently in preview.

    Immuta release notes

    June 2025

    August 2025

    2024.2 LTS

    April 2024

    June 2025

    August 2025

    hashtag
    Release Lifecycle Terms

    • General availability date: The date the software version is available to all customers.

    • Support period: The period of time between the general availability date and the end of support date. During this period, Immuta will keep the version up-to-date with important bug fixes and security updates.

    • End of support date: The date when Immuta will stop backporting critical bug fixes to the release. For LTS releases, this is one year after the general availability date. For all other major releases, this is typically one month after the next release (four months after the general availability date).

    • Extended support period: The period of time between the end of support date and the extended support date. During this period, Immuta will no longer provide bug fix updates to the version, but will investigate and troubleshoot issues. Immuta recommends to upgrade before this period.

    • End of extended support date: The date when Immuta is no longer obligated to investigate issues raised against the release. The end of extended support date will occur three months after the next major release.

    hashtag
    Long Term Support (LTS) Policy

    Immuta releases one long-term support (LTS) version each year that is kept up-to-date with important bug fixes and security updates for one year. Our customers who prefer to remain on an Immuta version for an extended period of time can install the LTS versions and be confident that their implementation is stable and supported.

    Major releases that are not designated “LTS” will be updated with important bug fixes until one month after the next major release.

    hashtag
    FAQ

    Why should I choose the LTS version?

    Immuta recognizes that frequent upgrades are not feasible for many of our customers and wants to ensure that customers can remain on versions of the product that are well-supported. The LTS model ensures that customers who choose to stay on an Immuta version for a longer time will benefit from stability and security updates without being exposed to the risk of functionality changes.

    I am on an older version today. Do I have to upgrade to an LTS version?

    Immuta recommends that customers on older versions start planning an upgrade to the LTS or a more recent quarterly version.

    Can I still use older versions?

    The Customer Success team will continue to answer questions and help you troubleshoot older versions as much as possible. However, Immuta will not provide code updates to versions that have reached their end of support date.

    What if I want the latest version of Immuta?

    Great! Staying up-to-date with the latest Immuta release is the best way to get the latest features and improvements. The LTS model does not impact you. You will always be supported with critical bug fixes and security updates when you are using one of the two most recent major releases of Immuta. Immuta recommends to plan for quarterly upgrades to stay on a supported version when not on the LTS.

    How are the non-LTS versions supported?

    Major releases that are not designated LTS are supported with critical bug fixes through the next two major release dates, which is typically a four-month period, giving time for an upgrade each quarter.

    What are considered critical bug fixes?

    • Cybersecurity vulnerabilities (CVEs) that are categorized as critical or high and have a possible impact within the Immuta solution.

    • Bugs that cause a severe and ongoing disruption to our customers' ability to conduct business in production, including critical performance impacts.

    2024.3

    September 2024

    {
    "statusCode": 404,
    "error": "Not Found",
    "message": "Could not find column information for Data Source {datasourceId}."
    }

    Features in Preview

    The table below outlines the available features currently in preview for this release and when they were introduced.

    Feature
    Availability
    Introduced

    Allow in the Snowflake and Databricks Unity Catalog integrations

    Public preview

    September 2023 (v2023.3)

    Private preview

    January 2024 (v2024.1)

    Immuta Support Matrix Overview

    hashtag
    Databases

    Immuta supports the following databases.

    • Amazon Redshift

    Public preview

    March 2024 (2024.2)

    Data source list updates

    Public preview

    January 2024 (v2024.2)

    Discover compliance frameworks

    Private preview

    December 2023

    Discover data inventory dashboard

    Private preview

    December 2023

    Bulk create Snowflake data sources

    Private preview

    September 2022 (v2022.3)

    Enhanced subscription tag variables

    Public preview

    July 2022 (v2022.2)

    Google BigQuery

    Private preview

    October 2022 (v2022.3)

    Masking fields within struct columns

    Public preview

    2021

    Monitors and observations

    Public preview

    February 2024

    Impersonation

    Public preview

    November 2021 (v2021.4)

    Native sensitive data discovery (SDD) for Redshift

    Private preview

    April 2024 (v2024.2)

    Native sensitive data discovery (SDD) for Starburst (Trino)

    Public preview

    April 2024 (v2024.2)

    Orchestrated masking policies

    Private preview

    October 2022 (v2022.4)

    Policy adjustments

    Public preview

    2021

    Project-scoped purpose exceptions for Snowflake and Databricks Unity Catalog integrations

    Public preview

    April 2024 (v2024.2.0)

    Snowflake lineage tag propagation

    Private preview

    December 2022 (v2022.5)

    Write access policies for Snowflake and Databricks Unity Catalog

    Private preview

    September 2023 (v2024.1)

    Write access policies for Starburst (Trino)

    Private preview

    February 2024 (v2024.2)

    Write access policies for Amazon S3

    Private preview

    April 2024 (v2024.2)

    masked columns as input for row-level policies
    Amazon S3 integration
    Audit export to S3 or ADLS Gen2
    Amazon Redshift Serverless
  • Amazon Redshift Spectrum

  • Amazon S3

  • Azure Synapse Analytics (Immuta only supports Dedicated SQL pools, not Serverless SQL pools.)

  • Google BigQuery

  • Databricks

    • Unity Catalog (on Databricks clusters or SQL warehouses)

    • Spark on supported Databricks Runtime versions (See the Databricks Installation guide for supported versions.)

  • Snowflake

  • Starburst (Trino)

  • hashtag
    Legacy Databases

    The following legacy databases are currently supported for existing customers.

    • Apache Impala

    • Amazon Athena

    • CDH Spark

    • Elasticsearch

    • Greenplum

    • Netezza

    • Oracle

    • PostgreSQL

    • SQL Server

    hashtag
    Kubernetes Versions

    Immuta supports the following Kubernetes distributions. Click a link below for details.

    • Amazon Elastic Kubernetes Service (EKS)

    • Azure Kubernetes Service (AKS)

    • Google Kubernetes Engine (GKE)

    • OpenShift

    • Rancher Kubernetes Engine (RKE)

    hashtag
    External Catalogs

    Immuta supports these external catalogs. Click a link below for configuration instructions.

    • Alation

    • Collibra

    • Custom REST Catalogs

    hashtag
    External IAMs

    For details about the IAM protocols and providers in this section, see the support matrix in the Identity Managers Overview.

    hashtag
    IAM Protocols

    Immuta fully supports these IAM protocols:

    • AD/LDAP

    • SAML 2.0

    • OpenID Connect 1.0

    hashtag
    IAM Providers

    These are common providers that support the protocols listed above. However, this list may not be all-inclusive, and if a provider stops supporting one of those protocols, Immuta may not fully support that provider.

    • Active Directory

    • ADFS

    • Amazon Cognito

    • Centrify

    • Google

    • JumpCloud

    • Keycloak

    • Microsoft Entra ID

    • Okta

    • OneLogin

    • OpenLDAP and other LDAP servers

    • Oracle Access Manager

    • Ping Identity

    hashtag
    Web Browsers

    Immuta supports the following web browsers.

    • Firefox

    • Google Chrome

    • Microsoft Edge

    Deprecations

    The following features are deprecated. They are still in the product but will be removed at their EOL date.

    Feature
    Use this alternative feature instead
    Deprecation notice
    End of life (EOL)
    Snowflake

    2024.4

    Managing the default subscription policy

    Create an "Allow individually selected users"

    2024.2

    2024.4

    hashtag
    Audit deprecations

    Feature
    Use this alternative feature instead
    Deprecation notice
    End of life (EOL)

    Legacy audit UI

    2023.3

    2024.3

    Legacy audit query text

    , which still contain query text

    2024.2

    2024.3

    Legacy /audit API

    Export UAM events to or

    hashtag
    End of life (EOL) features

    The following features have been fully removed from the product.

    hashtag
    2024.2 LTS removed features

    Feature
    Use this alternative feature instead
    Deprecation notice
    End of life (EOL)

    Amazon EMR Spark & Hive proxy connector

    None

    2023.2

    2024.2

    Azure Data Lake Storage proxy connector

    None

    2023.2

    2024.2

    Azure SQL Proxy Connector

    None

    Derived data sources (and CREATE_DATA_SOURCE_IN_PROJECT permission)

    None

    2024.2

    2024.4

    Legacy sensitive data discovery

    New native sensitive data discovery

    2023.3

    2023.3

    2024.4

    Legacy audit self-managed container output

    See the infrastructure recommendations for external container options

    2024.1

    2024.4

    2023.3

    2024.2

    Data source expiration dates

    None

    2023.2

    2024.2

    dbt integration

    None

    2024.1

    2024.2

    Databricks Spark with Unity Catalog support

    Databricks Unity Catalog integration

    2024.1

    2024.2

    Non-Unity Databricks SQL view-based integration

    Databricks Unity Catalog integration

    2023.3

    2024.2

    Discussions tab

    None

    2023.3

    2024.2

    HIPAA expert determination and templated policies (HIPAA and CCPA)

    Discover compliance frameworks

    2023.3

    2024.2

    Interpolated WHERE clause

    Other custom WHERE clause functions

    2023.2

    2024.2

    Legacy Amazon S3 proxy

    New Amazon S3 integration

    2023.3

    2024.2

    Legacy Starburst (Trino) integration

    New Starburst (Trino) integration

    2023.2

    2024.2

    MySQL proxy connector

    None

    2024.1

    2024.2

    Query editor (turned off by default on all new installations)

    None

    2023.3

    2024.2

    Single Node Docker installation

    Kubernetes installation

    2023.2

    2024.2

    Legacy Snowflake view-based integration (Snowflake integration without Snowflake Governance features)

    New Snowflake integration

    2023.2

    2024.2

    Tableau connector

    None

    2023.3

    2024.2

    subscription policy on all data sources
    New audit events page
    Use UAM events
    S3
    ADLS

    Immuta CLI Release Notes

    hashtag
    Immuta CLI v1.3.0

    Immuta CLI v1.3.0 was released April 4, 2024. It allows you to export universal audit model (UAM) events to ADLS Gen2.

    hashtag
    Downloads

    hashtag
    Linux

    • Linux x86_64 (amd64):

    • Linux ARMv8 (arm64):

    hashtag
    MacOS

    • Darwin x86_64 (amd64):

    • Darwin ARMv8 (arm64):

    hashtag
    Windows

    Download and add the binary to a directory in your system's $PATH as immuta.exe:

    hashtag
    Verify the File

    The SHA 256 checksum is available to verify the file at .

    hashtag
    Immuta CLI v1.2.1

    Immuta CLI v1.2.1 was released November 20, 2023. It fixes a bug with the integrations API.

    hashtag
    Downloads

    hashtag
    Linux

    • Linux x86_64 (amd64):

    • Linux ARMv8 (arm64):

    hashtag
    MacOS

    • Darwin x86_64 (amd64):

    • Darwin ARMv8 (arm64):

    hashtag
    Windows

    Download and add the binary to a directory in your system's $PATH as immuta.exe:

    hashtag
    Verify the File

    The SHA 256 checksum is available to verify the file at .

    hashtag
    Immuta CLI v1.2.0

    Immuta CLI v1.2.0 was released October 2, 2023. It fixes a bug with the audit export.

    hashtag
    Downloads

    hashtag
    Linux

    • Linux x86_64 (amd64):

    • Linux ARMv8 (arm64):

    hashtag
    MacOS

    • Darwin x86_64 (amd64):

    • Darwin ARMv8 (arm64):

    hashtag
    Windows

    Download and add the binary to a directory in your system's $PATH as immuta.exe:

    hashtag
    Verify the File

    The SHA 256 checksum is available to verify the file at .

    hashtag
    Immuta CLI v1.2.0-1

    Immuta CLI v1.2.0-1 was released August 19, 2022. It allows you to .

    hashtag
    Downloads

    hashtag
    Linux

    • Linux x86_64 (amd64):

    • Linux ARMv8 (arm64):

    hashtag
    MacOS

    • Darwin x86_64 (amd64):

    • Darwin ARMv8 (arm64):

    hashtag
    Windows

    Download and add the binary to a directory in your system's $PATH as immuta.exe:

    hashtag
    Verify the File

    The SHA 256 checksum is available to verify the file at .

    hashtag
    Immuta CLI v1.1.0

    Immuta CLI v1.1.0 was released August 19, 2022. It allows you to overwrite existing files in output directory targets when you specify the --force flag to or . If this --force flag is omitted, you will receive an error when the output directory exists and is not empty.

    hashtag
    Downloads

    hashtag
    Linux

    • Linux x86_64 (amd64):

    • Linux ARMv8 (arm64):

    hashtag
    MacOS

    • Darwin x86_64 (amd64):

    • Darwin ARMv8 (arm64):

    hashtag
    Windows

    Download and add the binary to a directory in your system's $PATH as immuta.exe:

    hashtag
    Verify the File

    The SHA 256 checksum is available to verify the file at .

    hashtag
    Immuta CLI v1.0.0

    The Immuta CLI v1.0.0 was released April 26, 2022. It includes new commands that allow users to manage sensitive data discovery.

    hashtag
    Downloads

    hashtag
    Linux

    • Linux x86_64 (amd64):

    • Linux ARMv8 (arm64):

    hashtag
    MacOS

    • Darwin x86_64 (amd64):

    • Darwin ARMv8 (arm64):

    hashtag
    Windows

    Download and add the binary to a directory in your system's $PATH as immuta.exe:

    hashtag
    Verify the File

    The SHA 256 checksum is available to verify the file at .

    hashtag
    New Commands

    • : The immuta sdd run command allows you to run SDD using the CLI instead of the API or UI. You can specify data sources on which to run SDD, or you can run SDD on all data sources.

    • : The immuta sdd classifier command and its sub commands allow you to create, search for, update, and delete sensitive data discovery rules.

    hashtag
    Updates and Enhancements

    • --output or -o flag allows you to specify yaml or json for the output.

    • --template option for the immuta api command has been changed to --outputTemplate. Additionally, this option is now available for all commands so that users can customize the output.

    hashtag
    Fixes

    • Running immuta policy clone when there were no policies available to clone did not indicate that a target directory was not created or updated. The CLI now prints the message No global policies available to clone.

    hashtag
    Deprecations

    • The verbose option is deprecated (in favor of the --output option).

    • The version command is deprecated.

    : The immuta sdd template command and its sub commands allow you to create, search for, update, and delete sensitive data discovery frameworks.
    must be managed through the Immuta UI.

    version is now a flag instead of a command.

    https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.3.0/immuta_cli_windows_amd64arrow-up-right
    https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.3.0/immuta_cli_SHA256SUMSarrow-up-right
    https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.1/immuta_cli_windows_amd64arrow-up-right
    https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.1/immuta_cli_SHA256SUMSarrow-up-right
    https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.0/immuta_cli_windows_amd64arrow-up-right
    https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.0/immuta_cli_SHA256SUMSarrow-up-right
    export universal audit model (UAM) events to S3
    https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.0-1/immuta_cli_windows_amd64arrow-up-right
    https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.0-1/immuta_cli_SHA256SUMSarrow-up-right
    clone your Immuta tenant
    policies
    https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.1.0/immuta_cli_windows_amd64arrow-up-right
    https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.1.0/immuta_cli_SHA256SUMSarrow-up-right
    https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.0.0/immuta_cli_windows_amd64arrow-up-right
    https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.0.0/immuta_cli_SHA256SUMSarrow-up-right
    Run sensitive data discovery (SDD)
    Manage patterns
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.3.0/immuta_cli_linux_amd64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.3.0/immuta_cli_linux_arm64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.3.0/immuta_cli_darwin_amd64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.3.0/immuta_cli_darwin_arm64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.1/immuta_cli_linux_amd64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.1/immuta_cli_linux_arm64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.1/immuta_cli_darwin_amd64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.1/immuta_cli_darwin_arm64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.0/immuta_cli_linux_amd64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.0/immuta_cli_linux_arm64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.0/immuta_cli_darwin_amd64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.0/immuta_cli_darwin_arm64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.0-1/immuta_cli_linux_amd64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.0-1/immuta_cli_linux_arm64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.0-1/immuta_cli_darwin_amd64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.0-1/immuta_cli_darwin_arm64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.1.0/immuta_cli_linux_amd64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.1.0/immuta_cli_linux_arm64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.1.0/immuta_cli_darwin_amd64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.1.0/immuta_cli_darwin_arm64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.0.0/immuta_cli_linux_amd64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.0.0/immuta_cli_linux_arm64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.0.0/immuta_cli_darwin_amd64 && chmod +x immuta
    curl -Lo immuta https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.0.0/immuta_cli_darwin_arm64 && chmod +x immuta
    Manage identification frameworks
    Global frameworks

    Preview Features

    Preview levels

    Preview level
    Access
    Support
    Documentation
    Contact

    Invitation only

    None

    None

    Product Management (required)

    Invitation only

    Best effort

    hashtag
    Design partner

    The design partner level is for SaaS customers only.

    In this preview level, Immuta launches an initial limited-functionality feature with a select group of customers to solve a specific challenge. The goal of this preview level is to validate that the solution solves the challenge in a way that is valuable, usable, and feasible.

    Throughout the feature development and launch processes, Product Management and Engineering meet regularly with the customer to gather feedback and help implement the feature. When the process starts, entire portions of the feature may be missing from the product, but the customer receives regular (potentially weekly) updates of the feature from the Engineering team.

    Design partner level features do not have support SLAs or Immuta customer support engagement; the customer solely works with the Immuta Product team. Design partner feature functionality is subject to change, discontinuation, and discontinuation of support at Immuta’s sole discretion. Immuta makes no delivery date commitments.

    hashtag
    Private preview

    Private preview features approximately match the product offered to the general public. Immuta only makes changes to the feature after gathering feedback or discovering unexpected implications of the feature.

    Immuta invites customers to the private preview, and they are required to engage with Immuta Product Management to provide feedback about the feature.

    Immuta makes commercially reasonable efforts to support private preview functionality; however, such support is not subject to SLA targets or processes. Immuta immediately closes support tickets that are filed and redirects customers to the Product Manager in charge of the feature. Private preview functionality is subject to change, discontinuation, and discontinuation of support at Immuta’s sole discretion.

    hashtag
    Public preview

    Public preview features match the product offered to the general public. Immuta only changes the feature to address bugs.

    Public preview features are fully documented on the Immuta website, but customers are expected (not required) to engage with Product Management and Customer Success to enable the feature.

    Immuta makes commercially reasonable efforts to support public preview functionality; however, such support is not subject to the normal SLA targets and will not be considered priority level 1 or 2. If public preview functionality impacts or is believed to reasonably impact other fully supported functionality, the customer must disable the public preview functionality; SLA targets and processes only apply once the public preview functionality is disabled. Issues discovered (even at priority levels 3 and 4) with public preview functionality will be resolved at Immuta’s sole discretion.

    hashtag
    Generally available (GA)

    GA features are complete and available to all customers. Full SLA targets and processes apply.

    Yes

    Product Management (required)

    Customer request

    Limited SLAs

    Yes

    Customer Success and Sales Engineering

    No action required

    Full SLAs

    Yes

    Customer Success and Sales Engineering

    Design partner
    Private preview
    Public preview
    Generally available

    Immuta Image Digests

    Use the image digests below to verify the integrity of Immuta images that you pull.

    circle-info

    Image digests may be different than the digests shown below if you are using a registry proxy, such as JFrog Artifactory or Sonatype Nexus, to proxy requests to the Immuta container registry. Registry proxies modify the image manifest resulting in a new image digest.

    hashtag
    OCIR (ocir.immuta.com)

    Image
    Digest

    sha256:7bcdebfbf23b90f62cffb347bfecdec6caf3f9d7110c4d9ec338761cbb78cad9

    ocir.immuta.com/stable/immuta-service:2024.2.7

    sha256:35d60b07dbab52829273bd01e9472dbdc70778f779702a6ba0523020d4de3804

    ocir.immuta.com/stable/immuta-service:2024.2.8

    sha256:9cf0c6c16b6be3fad9b87bacd30617eaff95e161fd8b5dcaf565489d30bdac15

    ocir.immuta.com/stable/immuta-service:2024.2.9

    sha256:48a56d91ebc78f597aba60e533ac26c64626006386fb54af077acacd811d5396

    ocir.immuta.com/stable/immuta-service:2024.2.10

    sha256:d9af0b783ca169165102cc2675d0847706ace08bb57edff42350e271f7b101a7

    ocir.immuta.com/stable/immuta-service:2024.2.11

    sha256:55a96c4c319e6d4b29ae8aa35fc2462220313dd84089ebcd335bd5cc248d67b4

    ocir.immuta.com/stable/immuta-service:2024.2.12

    sha256:6c7e4851abf31d9c191dc41099e59d4f110d4792885fa51ed9bf9ab46e3fb76e

    ocir.immuta.com/stable/immuta-service:2024.2.13

    sha256:5f35e9d017a1a348db91a9352223fe6e5b6aa911323210c5312d5b1085eb56ab

    ocir.immuta.com/stable/immuta-service:2024.2.14

    sha256:63e6d75909d7a6b37a5ea5c3f7cce6f389c58e721b2e17af813b737c528b7ff1

    ocir.immuta.com/stable/immuta-service:2024.2.15

    sha256:129edce31e65039b0030e2075518bf6d70ce8309c40a0c5d418c5dc94ff64c62

    ocir.immuta.com/stable/immuta-service:2024.2.16

    sha256:94c3154479eba31a0549b1dc8797e7fe6651c95c9e791f2c3c805209e62b6cbc

    ocir.immuta.com/stable/immuta-service:2024.2.17

    sha256:fd6aad91ce75b8179856d03e4c7cb45f3f0711de97118a10e4788ba3e7d40679

    ocir.immuta.com/stable/immuta-service:2024.2.19

    sha256:8642bb7ea6653538d0fb6b28ce245de7eee8886c3d3f8e97dd75d841e9c2fcf1

    ocir.immuta.com/stable/immuta-service:2024.2.20

    sha256:dc3498d651054a13dd7913c1a3127302f6cdcc92552f2ba83d0a490456f330cc

    ocir.immuta.com/stable/immuta-db:2024.2.0

    sha256:937c6ef7e13363d27379c236b1a08b32f484220c25e1d5058d1a68bc99cc754b

    ocir.immuta.com/stable/immuta-db:2024.2.1

    sha256:3b9a750a00e09519326582024184009d0dd6247f363649d945dac80b2ef79729

    ocir.immuta.com/stable/immuta-db:2024.2.2

    sha256:da23da7d66d74c785ec230846721a4576b59c9cfa908958eb0cc40e1bb887cca

    ocir.immuta.com/stable/immuta-db:2024.2.3

    sha256:e62ac6876962f8be169df9be059492810245efd5f5c04c79e9ab3d3fb0b97327

    ocir.immuta.com/stable/immuta-db:2024.2.4

    sha256:c5b3928f009fa42cce7c9593ac2e8cc569b93009617c450a6945befbf7d446ad

    ocir.immuta.com/stable/immuta-db:2024.2.5

    sha256:c8edc1ef604656b2b1b32bd40f6e40f6cdfa70f2d1e9f78f2a0d47d89410118b

    ocir.immuta.com/stable/immuta-db:2024.2.6

    sha256:83abc64c496892bbd1939b76d122bd22e3506008b2c3abf7f6a9e5822145d86c

    ocir.immuta.com/stable/immuta-db:2024.2.7

    sha256:2fdc48b2e3d1e755376a824956eadfdba626b0a93bbe0f893d59270dc4d130cd

    ocir.immuta.com/stable/immuta-db:2024.2.8

    sha256:9f0762ad76c01be287de31d10a5b11c69bea17dcffc217270576eaf277455deb

    ocir.immuta.com/stable/immuta-db:2024.2.9

    sha256:6bd709c88fbe566f186cd9ae325088e5c49d989973b73bbb5c350efe1a598007

    ocir.immuta.com/stable/immuta-db:2024.2.10

    sha256:28d23be72a291221e5bd1ed03087fbb6d06666646a5e56a1cd5d2ca0de56e04d

    ocir.immuta.com/stable/immuta-db:2024.2.11

    sha256:57d0154327e1e285ffa2de6b922d3cb8fde748aa572120c612a8f35ab950997d

    ocir.immuta.com/stable/immuta-db:2024.2.12

    sha256:5c34d5b706032937b02543211fdf2ae72d635ec76f8361f7f1cf85c534dc38b2

    ocir.immuta.com/stable/immuta-db:2024.2.13

    sha256:8cad4b312949ea9af48db6193919ded398db2a248f40d5d0a6f7fdb0465e67f2

    ocir.immuta.com/stable/immuta-db:2024.2.14

    sha256:7be53939829f72a4df7085e1b8d84effa222d16979d8ed4e8955499aeea61e63

    ocir.immuta.com/stable/immuta-db:2024.2.15

    sha256:8961e2fd9ee201e9ec75ea738c57426d4b3129fecbb03762cb8b9d16d880114b

    ocir.immuta.com/stable/immuta-db:2024.2.16

    sha256:d89ee8ad25b88941fbdfd835adcea11fa6852d042c51ce15b2925af685df1e26

    ocir.immuta.com/stable/immuta-db:2024.2.17

    sha256:e1668530845222dfbc61e41b18526b2395dc495b9865268fbf235bebb2b843bd

    ocir.immuta.com/stable/immuta-db:2024.2.19

    sha256:08c2dfc340e11fa4e118873746210c097e331dcba36e18431a7f985ce9199d85

    ocir.immuta.com/stable/immuta-db:2024.2.20

    sha256:10701e8dbd6b08ffca1d8af20f4dcbf68d0bcf448ed695c774e133150ff5cbe4

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.0

    sha256:4ee4cc2bf1a6eaee5f9e6c5705d034f9713e490289f074eff591da5501b14272

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.1

    sha256:454f3ae620f78f59ecd02d89cb0efb25f321883d7f3694cade9819fdd515c0ab

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.2

    sha256:27b138f62c03a4dfffe1f0b45f8a495a189a2633244d1d1297bc972d3c8a1c3a

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.3

    sha256:38a7d2b40b90045dfbc5959ef86a0734b4a5d74fbc964ad0a2a5b9ee397c77cd

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.4

    sha256:3140e4dc974fddb226a686c771f33ae3291041544d01f1e0e542e7ac70a54788

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.5

    sha256:39717e109bb02114a8c8fbf15fff24c665bbd7cf3d81022f5bc3936464d499fc

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.6

    sha256:1b2e115835cc4bd29804004559057752f200462ce1e778421a60217e03e165e1

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.7

    sha256:94da7de4c6d91af1c2d4da59f0bff3817b553df11ed061babf98b74be3d4cde6

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.8

    sha256:15c385d212ebea92c7161380a5db682c40c603ffa49720c2ebc4d88af0fbb1a2

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.9

    sha256:2bf5fb55acc3f433a35e239687e76a06e3d968a0196dcbf0c4b21ee6d88624f2

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.10

    sha256:64ced9bb46de4ae91321a55f7b6add7b8a35e3a24f3c5998477ac4fabf0e299e

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.11

    sha256:96118d0813b34cccd96c1733dacbeaaa04f81dd88f58890751dc19a05e090e03

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.12

    sha256:11f09f8a18d354730daf12147b9f55df33e2f9cc851e1bde8251f4444cebf8d9

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.13

    sha256:4b3e601eead366cd373650fa488d2c26dd2272862289c7532edeeb0aaef069ea

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.14

    sha256:f83dc83e57392f223f385994216fc2ae84870e0fee2130a58c0be9d1a8fd64ca

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.15

    sha256:d945c6794495310bd5334c3ab2be21a6694bb651c16513f081a84cd2575d4cfc

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.16

    sha256:57b4eaa0189c9a8a1f737fd949b929858df7fab817ee309ab2bc93ac541a610c

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.17

    sha256:45bbe8dccd5234fa3007afb34ad96eb0ba40a0de06198bd573b5c372bc2a5951

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.19

    sha256:405bbef1b8229672f4ddf471927f64c3f566a338d65e618c596617f67ed0e813

    ocir.immuta.com/stable/immuta-fingerprint:2024.2.20

    sha256:fbeb3b0f576182dc21ab056a8fb39142c52be77e54aa8da0b73217fbf07a39db

    ocir.immuta.com/stable/cache:2024.2.0

    sha256:cc6d2cd7c3d8317034dc66a20292bbb949c56481cb61e60ddaf4a3b639db0084

    ocir.immuta.com/stable/cache:2024.2.1

    sha256:a56b626c8a543d1edcfe9bfde131f93e7e30747865201f58cc8d76b327d77242

    ocir.immuta.com/stable/cache:2024.2.2

    sha256:2b8e9d042f62cfff9195976da7a34924f275d4879c88c350fa52f3a29bcedf6f

    ocir.immuta.com/stable/cache:2024.2.3

    sha256:594344acd5d1d2552cd3fa00978f8fbfb3fcb34b336afdf1c04e0f55cedaf43f

    ocir.immuta.com/stable/cache:2024.2.4

    sha256:f7d428ee5f76b7b16b6ac215581f925b72097e3dadc5196c12fe07bde30ed733

    ocir.immuta.com/stable/cache:2024.2.5

    sha256:12cb061fb5ce80cca28dcfa2ef5b9df2e16db453720409e62e311b7ae55c9fd2

    ocir.immuta.com/stable/cache:2024.2.6

    sha256:a769af3754a3627be07bd853c10d22e2dced2d47cfc8233bbc0f5ee1dc634e09

    ocir.immuta.com/stable/cache:2024.2.7

    sha256:036ca188c212928467e1fc85b3c608857c9575a3a961a5cbbbd7f5caf99560d9

    ocir.immuta.com/stable/cache:2024.2.8

    sha256:72723c763374674e2ca25767fd45de05d0ac02e93be9361812cbeaf6e5221470

    ocir.immuta.com/stable/cache:2024.2.9

    sha256:ffb4bec11a616e50bf60a8eca8a306460ac95763da56138278d9b9f0c9e40892

    ocir.immuta.com/stable/cache:2024.2.10

    sha256:01b676499a8f4c03f8514765cf2b100030e3a947f2a067990be6a269147f969c

    ocir.immuta.com/stable/cache:2024.2.11

    sha256:7a0c539a3358669afde355b052f487799caeecc425ccd4aab1277b125f95b8e4

    ocir.immuta.com/stable/cache:2024.2.12

    sha256:3258aa43faa0700430f8a7d8fab50c7a263c1fb2c2b189f3a51cdf5ceb8963fe

    ocir.immuta.com/stable/cache:2024.2.13

    sha256:d95b0df1fb07020e5fb205db7b245bdb966f62f77d714dd06f95851a7828689d

    ocir.immuta.com/stable/cache:2024.2.14

    sha256:c42247c87978cb44c33e0cfddad3b0aae5ebc7685db79aa56afb158ab5760d88

    ocir.immuta.com/stable/cache:2024.2.15

    sha256:2222e41683c6ba5bc73dfdcc9430f9b0d17df8d85ee7e75c4be568f2c11b0bb5

    ocir.immuta.com/stable/cache:2024.2.16

    sha256:34b8513646cc9893cb3d88e2b298f0ef820e864ce7d17d31faf2992b1d405fd5

    ocir.immuta.com/stable/cache:2024.2.17

    sha256:926da939351cad115b6724c34bc52e10a3b96d514dbe0b3500c5f2d197a26394

    ocir.immuta.com/stable/cache:2024.2.19

    sha256:3669a15bbf27cd9b7b49c6c17b651c4f69f9c96b35ea84d4c2babeb35d21acf1

    ocir.immuta.com/stable/cache:2024.2.20

    sha256:581cbebad019804fe6e100a2728b3db6aca4b331a60e2318c3392ac1fc308c42

    ocir.immuta.com/stable/audit-service:2024.2.0

    sha256:9e18f151ad223b4f134817264d10093f9815b97bc962443b1c05f52f1b43edda

    ocir.immuta.com/stable/audit-service:2024.2.1

    sha256:61100bf4350922faa382e9aec68d5f524d9affc9961d9925dc364b17b0519211

    ocir.immuta.com/stable/audit-service:2024.2.2

    sha256:c18e41fe81d20bccc604910f31c03fe1a7d56f1b58d86921cfb0133fc14df2d3

    ocir.immuta.com/stable/audit-service:2024.2.3

    sha256:5e16c78fb4c1ab50b52f8fc2da62d837533ca8eebaec31ad01c4ecfb6d762baa

    ocir.immuta.com/stable/audit-service:2024.2.4

    sha256:66d72c024a1fb18b5a639a50d84aac79148a4b06737ca92be6d3b96edf46fe3f

    ocir.immuta.com/stable/audit-service:2024.2.5

    sha256:6ec918f689b81cde22d1e1c6050c1bbaa1df3c75f5ed9180e1dd02ade23e8600

    ocir.immuta.com/stable/audit-service:2024.2.6

    sha256:6754e97956b2171f0af27a35588d0df4805411e670eedd55fcedcac0f734504e

    ocir.immuta.com/stable/audit-service:2024.2.7

    sha256:360dac991aca239f186f5716fdf14264e14edab09c5f6f15d87c6e4eadd89d60

    ocir.immuta.com/stable/audit-service:2024.2.8

    sha256:e5888c19b50a343a4e549a13237272d29d812046b2402d7389f2b083bfcc2768

    ocir.immuta.com/stable/audit-service:2024.2.9

    sha256:0f0d0944cbd0aa10e6beddf039dc4ee3bb6d499d57c17f2fc795c09a6e7fe6dc

    ocir.immuta.com/stable/audit-service:2024.2.10

    sha256:82d717eea1fbe9b5f283d08e019f9e7d1e732f765d3bd4a3538da9e9a5059633

    ocir.immuta.com/stable/audit-service:2024.2.11

    sha256:fe7247673e43b05b094203fe92407d3815b4f6d5dfc4a15b5cea52a59c2bdcb9

    ocir.immuta.com/stable/audit-service:2024.2.12

    sha256:eee399c9514eff50875d20993e3d52433826d76d34be0b8710f7fd8b43ca34c4

    ocir.immuta.com/stable/audit-service:2024.2.13

    sha256:0e2d8117a6dae43e68d8fc462851a7af539b67c16328b51a42cd69b8149a5a1f

    ocir.immuta.com/stable/audit-service:2024.2.14

    sha256:17014121ce92053004ce363dbc9f2a2fecd2aeee50c69087fe1f07e1f73b3cb5

    ocir.immuta.com/stable/audit-service:2024.2.15

    sha256:df91ada3ac442896b35b5886c84beb49dbd10babc2745f33882b3071fb3860c9

    ocir.immuta.com/stable/audit-service:2024.2.16

    sha256:f735709b6aae0c9e04aae6fa9342bd8cf63ad0003ab40ccca9724d629ee00987

    ocir.immuta.com/stable/audit-service:2024.2.17

    sha256:f23a401f3118df0eebd153dd0340e574a2468ccc9bc07b30f738a2ef5ae10a28

    ocir.immuta.com/stable/audit-service:2024.2.19

    sha256:6392b00a96a45ef962a43b3ea5a2f595d211f720cc880a50c1b46ee0109aad12

    ocir.immuta.com/stable/audit-service:2024.2.20

    sha256:2daf200b9f204de1ae6db8b8f8151d5532ac8b54739b4629e2009a0a2e6a2f6f

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.0

    sha256:aed46e5d16d06019a66ed48fa4e1836a64005136359c7d6b1c533d3656d244b1

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.1

    sha256:8115cf079e611faa380dd96fbd8384cf333e50d388dc6ca8c7a492c0447525ae

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.2

    sha256:280e24895f1690b9003ef30ab9a68f0490ef86f9fa11321f7cc80b7a59f2b56a

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.3

    sha256:cd85301b17ef04f1d2d6c6667580d0749e0debb788bc607853fbb47369e1349c

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.4

    sha256:09c987e7dc344f3f80407cffb6b6a2050177fdc4be70659460e04840a6aba4e6

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.5

    sha256:ce05971799a0bea709c9ec15f14db6cdf6a08184668c6a252d4478cb73677eaa

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.6

    sha256:ac43dc0e6624c1d0c700c0698b35f42132a15d4bc05d76c86a14e117c642efec

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.7

    sha256:fcffa343f3f204c2185d503c0c0d4851a654fc25a26af3f05bf2f098b751e67c

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.8

    sha256:90006330eb872152168fbb1dafa65105b372bf5360c6bf5eacde408d2f9f787a

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.9

    sha256:4cac0c2ec88c0e8340e4abeb75df89820405f3d555f89f9f2e159f53ed2dbe99

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.10

    sha256:1a1e1425658911650cd951c9f1ff0a7e484e3f9f575d2553b8ba0108d4e4d084

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.11

    sha256:32ea58dfe7aac00842dbad487f00e8e0f8373776f41bac0afc585c1a519a0f4b

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.12

    sha256:a69d203893db5a51209aec1df8193a050850c4181e812d2473593f7a2fa7e553

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.13

    sha256:fab3f9fd31b90a507b4e2550d3d54f7f2bda127ab9e0de04fd6bf3189896c351

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.14

    sha256:4b02b8a3a95cf2ca6e7b36500e671b4741485c50a5e37511ae6c85388bca6dbb

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.15

    sha256:d4ea922372595f9c687cfa23a5207a315753edfe3b994543ccb4a804d1600341

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.16

    sha256:d1758da1fb6006d8e6e1879a71a955e8f8f7194d703c43f289e73a480069f6f3

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.17

    sha256:340ab84cb6d03337cba9ab59c447e19a7121c03df0241aa1470bf7119f786369

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.19

    sha256:e9726c5bcb2f43742c43327a7af8cc0f7b646f0bc66087f2f8015f9f3df55674

    ocir.immuta.com/stable/audit-export-cronjob:2024.2.20

    sha256:3081f69270ac48f9f74256b4e2b5ccfba8ea7dde6c8fc9566bce37eb15809ec3

    ocir.immuta.com/stable/classify-service:2024.2.0

    sha256:1fda63074dfc6ef28855e00424102e5e634168d3fbd08caf916d498045d4f650

    ocir.immuta.com/stable/classify-service:2024.2.1

    sha256:6a1fec7c8a3b1849309c502db5396ba042478fba98d915ab92e066ccb8014171

    ocir.immuta.com/stable/classify-service:2024.2.2

    sha256:945ccece30106d042768c33772452e01529823d49f2b31e5b8ddb74e185f7e78

    ocir.immuta.com/stable/classify-service:2024.2.3

    sha256:362e8f2d67472178aabca9b0804e9b60a5e60f0f68e46e192e99564854f192de

    ocir.immuta.com/stable/classify-service:2024.2.4

    sha256:3a14a8cc421d343a625bcda90afc924df3d8b3855a1fd27c1677a205c36db2ca

    ocir.immuta.com/stable/classify-service:2024.2.5

    sha256:dfc7a7a2d410e75585969268beea373531a201dde9454cc8e925fed5e5b9d666

    ocir.immuta.com/stable/classify-service:2024.2.6

    sha256:b497f67c7fdf787565dfb1f269df040630da340a454d85a860fa1c40b21976e7

    ocir.immuta.com/stable/classify-service:2024.2.7

    sha256:cb95df2ce28e30c7e397085ead564d278c7f1277cc45d2da333023fbe9c0caf7

    ocir.immuta.com/stable/classify-service:2024.2.8

    sha256:363ec084c79c970c2af9a3aaed9e6c85ea22b9f8547cbd2f7d5e1eb13d0780f5

    ocir.immuta.com/stable/classify-service:2024.2.9

    sha256:e0f490c4075f856822cffe44080c7b05f2add797e8d96bc8a2781f1126c19fe5

    ocir.immuta.com/stable/classify-service:2024.2.10

    sha256:72ac0c2b338d32301c56f52a25c4b24e626da644f608c4963561e08a225d8b26

    ocir.immuta.com/stable/classify-service:2024.2.11

    sha256:a81dac6f13abe33c3792bcfcf11481e9e52e7953a5ef1d7d78a0773c31459663

    ocir.immuta.com/stable/classify-service:2024.2.12

    sha256:a49e72c25e8c8a101c42b23c2a6394492dc54dad508f93cdadf5017b25066f34

    ocir.immuta.com/stable/classify-service:2024.2.13

    sha256:5ac30b5554b3f9365322782a905f7f0054ddbf38f1466a03f497e1c7f4dffa96

    ocir.immuta.com/stable/classify-service:2024.2.14

    sha256:1f5c2f93626d214cf5b99848ac58678a41fcdf390c193d949213ab2f8842115b

    ocir.immuta.com/stable/classify-service:2024.2.15

    sha256:10b8284057ab29b41f1b7099e9be7a0eadad5cd3a2a71e11cb9797b4e0366270

    ocir.immuta.com/stable/classify-service:2024.2.16

    sha256:fc70c777122b4de0b036f60565d7a0d5ba33d2bcf2152f0288b3e86241491b31

    ocir.immuta.com/stable/classify-service:2024.2.17

    sha256:0a31bf435ef80a645e8e8d6ea5234e75a66310417586e04973d6766b0cd67479

    ocir.immuta.com/stable/classify-service:2024.2.19

    sha256:43c87c2f8592cf1455a2e3045eb5dda733e2ee8e6d523b75beb344ce57e75bf0

    ocir.immuta.com/stable/classify-service:2024.2.20

    sha256:2d989a47a3eb43eeeadf6108dc58455d1c4d2272339d2fbddf180d1e7914ffba

    ocir.immuta.com/stable/immuta-service:2024.2.0

    sha256:34e683ee7a1fd871b29286341e638888a5567a640b85cf47b4efa85618952271

    ocir.immuta.com/stable/immuta-service:2024.2.1

    sha256:53f10333edea8e396c5c54cce2184d3f4d5f29019472cfaadde3152194dab8a6

    ocir.immuta.com/stable/immuta-service:2024.2.2

    sha256:850eb40a9c837f1e8808098b680cdfa72e81c5ce1626e5d161f99b2e7b56e808

    ocir.immuta.com/stable/immuta-service:2024.2.3

    sha256:5914d2ca8ff322dadca4b9b8cd355516378ce46927496568f15f497ff3eedc7c

    ocir.immuta.com/stable/immuta-service:2024.2.4

    sha256:a8457a0658ccd7323ec115081bbac93c7d34563c2ecb6ac97783032c80696574

    ocir.immuta.com/stable/immuta-service:2024.2.5

    sha256:507a61c59e173e1ddac189e3fa3562455f7ae9ee0032e606c6352ffd1a4dc519

    ocir.immuta.com/stable/immuta-service:2024.2.6