Skip to content

Commit 04a1354

Browse files
Merge pull request #234511 from OWinfreyATL/owinfreyATL-ChecksArchive
August 2018 removed from Archive
2 parents 4d454ff + b09d83f commit 04a1354

File tree

1 file changed

+0
-122
lines changed

1 file changed

+0
-122
lines changed

articles/active-directory/fundamentals/whats-new-archive.md

Lines changed: 0 additions & 122 deletions
Original file line numberDiff line numberDiff line change
@@ -8215,125 +8215,3 @@ As part of our updated SAML-based app configuration UI, you'll get:
82158215
To turn on this updated view, click the **Try out our new experience** link from the top of the **Single Sign-On** page. For more information, see [Tutorial: Configure SAML-based single sign-on for an application with Azure Active Directory](../manage-apps/view-applications-portal.md).
82168216

82178217
---
8218-
8219-
## August 2018
8220-
8221-
### Changes to Azure Active Directory IP address ranges
8222-
8223-
**Type:** Plan for change
8224-
**Service category:** Other
8225-
**Product capability:** Platform
8226-
8227-
We're introducing larger IP ranges to Azure AD, which means if you've configured Azure AD IP address ranges for your firewalls, routers, or Network Security Groups, you'll need to update them. We're making this update so you won't have to change your firewall, router, or Network Security Groups IP range configurations again when Azure AD adds new endpoints.
8228-
8229-
Network traffic is moving to these new ranges over the next two months. To continue with uninterrupted service, you must add these updated values to your IP Addresses before September 10, 2018:
8230-
8231-
- 20.190.128.0/18
8232-
8233-
- 40.126.0.0/18
8234-
8235-
We strongly recommend not removing the old IP Address ranges until all of your network traffic has moved to the new ranges. For updates about the move and to learn when you can remove the old ranges, see [Office 365 URLs and IP address ranges](https://support.office.com/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2).
8236-
8237-
---
8238-
8239-
### Change notice: Authorization codes will no longer be available for reuse
8240-
8241-
**Type:** Plan for change
8242-
**Service category:** Authentications (Logins)
8243-
**Product capability:** User Authentication
8244-
8245-
Starting on November 15, 2018, Azure AD will stop accepting previously used authentication codes for apps. This security change helps to bring Azure AD in line with the OAuth specification and will be enforced on both the v1 and v2 endpoints.
8246-
8247-
If your app reuses authorization codes to get tokens for multiple resources, we recommend that you use the code to get a refresh token, and then use that refresh token to acquire additional tokens for other resources. Authorization codes can only be used once, but refresh tokens can be used multiple times across multiple resources. An app that attempts to reuse an authentication code during the OAuth code flow will get an invalid_grant error.
8248-
8249-
For this and other protocols-related changes, see [the full list of what's new for authentication](../develop/reference-breaking-changes.md).
8250-
8251-
---
8252-
8253-
### Converged security info management for self-service password (SSPR) and multifactor authentication (MFA)
8254-
8255-
**Type:** New feature
8256-
**Service category:** SSPR
8257-
**Product capability:** User Authentication
8258-
8259-
This new feature helps people manage their security info (such as, phone number, mobile app, and so on) for SSPR and multifactor authentication (MFA) in a single location and experience; as compared to previously, where it was done in two different locations.
8260-
8261-
This converged experience also works for people using either SSPR or multifactor authentication (MFA). Additionally, if your organization doesn't enforce multifactor authentication (MFA) or SSPR registration, people can still register any multifactor authentication (MFA) or SSPR security info methods allowed by your organization from the My Apps portal.
8262-
8263-
This is an opt-in public preview. Administrators can turn on the new experience (if desired) for a selected group or for all users in a tenant. For more information about the converged experience, see the [Converged experience blog](https://cloudblogs.microsoft.com/enterprisemobility/2018/08/06/mfa-and-sspr-updates-now-in-public-preview/)
8264-
8265-
---
8266-
8267-
### New HTTP-Only cookies setting in Azure AD Application proxy apps
8268-
8269-
**Type:** New feature
8270-
**Service category:** App Proxy
8271-
**Product capability:** Access Control
8272-
8273-
There's a new setting called, **HTTP-Only Cookies** in your Application Proxy apps. This setting helps provide extra security by including the HTTPOnly flag in the HTTP response header for both Application Proxy access and session cookies, stopping access to the cookie from a client-side script and further preventing actions like copying or modifying the cookie. Although this flag hasn't been used previously, your cookies have always been encrypted and transmitted using a TLS connection to help protect against improper modifications.
8274-
8275-
This setting isn't compatible with apps using ActiveX controls, such as Remote Desktop. If you're in this situation, we recommend that you turn off this setting.
8276-
8277-
For more information about the HTTP-Only Cookies setting, see [Publish applications using Azure AD Application Proxy](../app-proxy/application-proxy-add-on-premises-application.md).
8278-
8279-
---
8280-
8281-
### Privileged Identity Management (PIM) for Azure resources supports Management Group resource types
8282-
8283-
**Type:** New feature
8284-
**Service category:** Privileged Identity Management
8285-
**Product capability:** Privileged Identity Management
8286-
8287-
Just-In-Time activation and assignment settings can now be applied to Management Group resource types, just like you already do for Subscriptions, Resource Groups, and Resources (such as VMs, App Services, and more). In addition, anyone with a role that provides administrator access for a Management Group can discover and manage that resource in PIM.
8288-
8289-
For more information about PIM and Azure resources, see [Discover and manage Azure resources by using Privileged Identity Management](../privileged-identity-management/pim-resource-roles-discover-resources.md)
8290-
8291-
---
8292-
8293-
### Application access (preview) provides faster access to the Azure portal
8294-
8295-
**Type:** New feature
8296-
**Service category:** Privileged Identity Management
8297-
**Product capability:** Privileged Identity Management
8298-
8299-
Today, when activating a role using PIM, it can take over 10 minutes for the permissions to take effect. If you choose to use Application access, which is currently in public preview, administrators can access the Azure portal as soon as the activation request completes.
8300-
8301-
Currently, Application access only supports the Azure portal experience and Azure resources. For more information about PIM and Application access, see [What is Azure AD Privileged Identity Management?](../privileged-identity-management/pim-configure.md)
8302-
8303-
---
8304-
8305-
### New Federated Apps available in Azure AD app gallery - August 2018
8306-
8307-
**Type:** New feature
8308-
**Service category:** Enterprise Apps
8309-
**Product capability:** 3rd Party Integration
8310-
8311-
In August 2018, we've added these 16 new apps with Federation support to the app gallery:
8312-
8313-
[Hornbill](../saas-apps/hornbill-tutorial.md), [Bridgeline Unbound](../saas-apps/bridgelineunbound-tutorial.md), [Sauce Labs - Mobile and Web Testing](../saas-apps/saucelabs-mobileandwebtesting-tutorial.md), [Meta Networks Connector](../saas-apps/metanetworksconnector-tutorial.md), [Way We Do](../saas-apps/waywedo-tutorial.md), [Spotinst](../saas-apps/spotinst-tutorial.md), [ProMaster (by Inlogik)](../saas-apps/promaster-tutorial.md), SchoolBooking, [4me](../saas-apps/4me-tutorial.md), [Dossier](../saas-apps/dossier-tutorial.md), [N2F - Expense reports](../saas-apps/n2f-expensereports-tutorial.md), [Comm100 Live Chat](../saas-apps/comm100livechat-tutorial.md), [SafeConnect](../saas-apps/safeconnect-tutorial.md), [ZenQMS](../saas-apps/zenqms-tutorial.md), [eLuminate](../saas-apps/eluminate-tutorial.md), [Dovetale](../saas-apps/dovetale-tutorial.md).
8314-
8315-
For more information about the apps, see [SaaS application integration with Azure Active Directory](../saas-apps/tutorial-list.md). For more information about listing your application in the Azure AD app gallery, see [List your application in the Azure Active Directory application gallery](../manage-apps/v2-howto-app-gallery-listing.md).
8316-
8317-
---
8318-
8319-
### Native Tableau support is now available in Azure AD Application Proxy
8320-
8321-
**Type:** Changed feature
8322-
**Service category:** App Proxy
8323-
**Product capability:** Access Control
8324-
8325-
With our update from the OpenID Connect to the OAuth 2.0 Code Grant protocol for our pre-authentication protocol, you no longer have to do any additional configuration to use Tableau with Application Proxy. This protocol change also helps Application Proxy better support more modern apps by using only HTTP redirects, which are commonly supported in JavaScript and HTML tags.
8326-
8327-
---
8328-
8329-
### New support to add Google as an identity provider for B2B guest users in Azure Active Directory (preview)
8330-
8331-
**Type:** New feature
8332-
**Service category:** B2B
8333-
**Product capability:** B2B/B2C
8334-
8335-
By setting up federation with Google in your organization, you can let invited Gmail users sign in to your shared apps and resources using their existing Google account, without having to create a personal Microsoft Account (MSAs) or an Azure AD account.
8336-
8337-
This is an opt-in public preview. For more information about Google federation, see [Add Google as an identity provider for B2B guest users](../external-identities/google-federation.md).
8338-
8339-
---

0 commit comments

Comments
 (0)