The October 2025 release of Administrator includes the following important notices.
Deprecated support
Effective in the October 2025 release, session-based authentication is deprecated. Informatica intends to drop support for session-based authentication in the October 2026 release.
Deprecated functionality is supported, but Informatica intends to drop support in a future release. Informatica requests that you transition to different functionality before the functionality is dropped.
Informatica plans to replace session IDs used for user authentication with JSON Web Tokens (JWT). Starting on November 3, 2025, organization administrators have the option to switch from session-based to JWT-based authentication on the Organization page in Administrator. Once enabled, browser-based user interface communications seamlessly use JWT behind the scenes.
For REST API calls, session IDs must still be included in request headers as usual. However, now the session value carries a JWT with a fixed expiry time configured on the Organization page. As a result, REST API scripts need to be updated to handle automatic re-authentication before or after the token expires. For more information, see the JWT Support Knowledge article.
In the October 2025 release, session-based authentication will remain the default. Starting in April 2026, JWT will become the default authentication method. By October 2026, session-based authentication will no longer be available.
Note: If your organization uses B2B Gateway, API Manager, or the REST V2 Connector, don't select the JWT option in the October 2025 release. The JWT option for B2B Gateway and REST V2 Connector will be available in a future release.
Azure DevOps repository access using OAuth
Microsoft is replacing Microsoft Azure DevOps OAuth with Microsoft Entra ID OAuth. Effective on November [date??], the Informatica authorization server will use Microsoft Entra ID OAuth. If your organization uses an Azure DevOps repository and you access the repository using OAuth, refresh your access token before it expires to avoid interruptions. To refresh your token, click the User icon on the toolbar and select Settings. In the Source Code Control Credentials section, click Drop Authentication and then reconfigure OAuth authentication.
If your access token expires before you reconfigure OAuth authentication, you receive an error message when you try to access the Azure DevOps repository. You must refresh the token before you can access the repository.