You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory-b2c/partner-gallery.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,6 +43,7 @@ Microsoft partners with the following ISVs for MFA and Passwordless authenticati
43
43
|:-------------------------|:--------------|
44
44
||[BlokSec](./partner-bloksec.md) is a passwordless authentication and tokenless MFA solution, which provides real-time consent-based services and protects customers against identity-centric cyber-attacks such as password stuffing, phishing, and man-in-the-middle attacks. |
45
45
||[Hypr](./partner-hypr.md) is a passwordless authentication provider, which replaces passwords with public key encryptions eliminating fraud, phishing, and credential reuse. |
46
+
||[IDEMIA](./partner-idemia.md) is a passwordless authentication provider, which provides real-time consent-based services with biometric authentication like faceID and fingerprinting eliminating fraud and credential reuse. |
46
47
||[itsme](./partner-itsme.md) is an Electronic Identification, Authentication and Trust Services (eiDAS) compliant digital ID solution to allow users to sign in securely without card readers, passwords, two-factor authentication, and multiple PIN codes. |
47
48
| | [Keyless](./partner-keyless.md) is a passwordless authentication provider that provides authentication in the form of a facial biometric scan and eliminates fraud, phishing, and credential reuse.
48
49
||[Nevis](./partner-nevis.md) enables passwordless authentication and provides a mobile-first, fully branded end-user experience with Nevis Access app for strong customer authentication and to comply with PSD2 transaction requirements. |
Copy file name to clipboardExpand all lines: articles/active-directory/hybrid/reference-connect-version-history-archive.md
+194-1Lines changed: 194 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,200 @@ ms.custom: has-adal-ref
19
19
The Azure Active Directory (Azure AD) team regularly updates Azure AD Connect with new features and functionality. Not all additions are applicable to all audiences.
20
20
21
21
>[!NOTE]
22
-
> This article contains version reference information about all archived versions of Azure AD - 1.3.20.0 and older. For current releases, see the [Azure AD Connect Version release history](reference-connect-version-history.md)
22
+
> This article contains version reference information about all archived versions of Azure AD - 1.5.42.0 and older. For current releases, see the [Azure AD Connect Version release history](reference-connect-version-history.md)
23
+
24
+
## 1.5.42.0
25
+
26
+
### Release status
27
+
07/10/2020: Released for download
28
+
29
+
### Functional changes
30
+
This release includes a public preview of the functionality to export the configuration of an existing Azure AD Connect server into a .JSON file which can then be used when installing a new Azure AD Connect server to create a copy of the original server.
31
+
32
+
A detailed description of this new feature can be found in [this article](./how-to-connect-import-export-config.md)
33
+
34
+
### Fixed issues
35
+
- Fixed a bug where there would be a false warning about the local DB size on the localized builds during upgrade.
36
+
- Fixed a bug where there would be a false error in the app events for the account name/domain name swap.
37
+
- Fixed an error where Azure AD Connect would fail to install on a DC, giving error "member not found".
38
+
39
+
40
+
## 1.5.30.0
41
+
42
+
### Release status
43
+
05/07/2020: Released for download
44
+
45
+
### Fixed issues
46
+
This hotfix build fixes an issue where unselected domains were getting incorrectly selected from the wizard UI if only grandchild containers were selected.
47
+
48
+
49
+
>[!NOTE]
50
+
>This version includes the new Azure AD Connect sync V2 endpoint API. This new V2 endpoint is currently in public preview. This version or later is required to use the new V2 endpoint API. However, simply installing this version does not enable the V2 endpoint. You will continue to use the V1 endpoint unless you enable the V2 endpoint. You need to follow the steps under [Azure AD Connect sync V2 endpoint API (public preview)](how-to-connect-sync-endpoint-api-v2.md) in order to enable it and opt-in to the public preview.
51
+
52
+
## 1.5.29.0
53
+
54
+
### Release status
55
+
04/23/2020: Released for download
56
+
57
+
### Fixed issues
58
+
This hotfix build fixes an issue introduced in build 1.5.20.0 where a tenant administrator with MFA was not able to enable DSSO.
59
+
60
+
## 1.5.22.0
61
+
62
+
### Release status
63
+
04/20/2020: Released for download
64
+
65
+
### Fixed issues
66
+
This hotfix build fixes an issue in build 1.5.20.0 if you have cloned the **In from AD - Group Join** rule and have not cloned the **In from AD - Group Common** rule.
67
+
68
+
## 1.5.20.0
69
+
70
+
### Release status
71
+
04/09/2020: Released for download
72
+
73
+
### Fixed issues
74
+
- This hotfix build fixes an issue with build 1.5.18.0 if you have the Group Filtering feature enabled and use mS-DS-ConsistencyGuid as the source anchor.
75
+
- Fixed an issue in the ADSyncConfig PowerShell module, where invoking DSACLS command used in all the Set-ADSync* Permissions cmdlets would cause one of the following errors:
76
+
-`GrantAclsNoInheritance : The parameter is incorrect. The command failed to complete successfully.`
77
+
-`GrantAcls : No GUID Found for computer …`
78
+
79
+
> [!IMPORTANT]
80
+
> If you have cloned the **In from AD - Group Join** sync rule and have not cloned the **In from AD - Group Common** sync rule and plan to upgrade, complete the following steps as part of the upgrade:
81
+
> 1. During Upgrade, uncheck the option **Start the synchronization process when configuration completes**.
82
+
> 2. Edit the cloned join sync rule and add the following two transformations:
83
+
> - Set direct flow `objectGUID` to `sourceAnchorBinary`.
84
+
> - Set expression flow `ConvertToBase64([objectGUID])` to `sourceAnchor`.
85
+
> 3. Enable the scheduler using `Set-ADSyncScheduler -SyncCycleEnabled $true`.
86
+
87
+
88
+
89
+
## 1.5.18.0
90
+
91
+
### Release status
92
+
04/02/2020: Released for download
93
+
94
+
### Functional changes ADSyncAutoUpgrade
95
+
96
+
- Added support for the mS-DS-ConsistencyGuid feature for group objects. This allows you to move groups between forests or reconnect groups in AD to Azure AD where the AD group objectID has changed, e.g. when an AD server is rebuilt after a calamity. For more information see [Moving groups between forests](how-to-connect-migrate-groups.md).
97
+
- The mS-DS-ConsistencyGuid attribute is automatically set on all synced groups and you do not have to do anything to enable this feature.
98
+
- Removed the Get-ADSyncRunProfile because it is no longer in use.
99
+
- Changed the warning you see when attempting to use an Enterprise Admin or Domain Admin account for the AD DS connector account to provide more context.
100
+
- Added a new cmdlet to remove objects from the connector space the old CSDelete.exe tool is removed, and it is replaced with the new Remove-ADSyncCSObject cmdlet. The Remove-ADSyncCSObject cmdlet takes a CsObject as input. This object can be retrieved by using the Get-ADSyncCSObject cmdlet.
101
+
102
+
>[!NOTE]
103
+
>The old CSDelete.exe tool has been removed and replaced with the new Remove-ADSyncCSObject cmdlet
104
+
105
+
### Fixed issues
106
+
107
+
- Fixed a bug in the group writeback forest/OU selector on rerunning the Azure AD Connect wizard after disabling the feature.
108
+
- Introduced a new error page that will be displayed if the required DCOM registry values are missing with a new help link. Information is also written to log files.
109
+
- Fixed an issue with the creation of the Azure Active Directory synchronization account where enabling Directory Extensions or PHS may fail because the account has not propagated across all service replicas before attempted use.
110
+
- Fixed a bug in the sync errors compression utility that was not handling surrogate characters correctly.
111
+
- Fixed a bug in the auto upgrade which left the server in the scheduler suspended state.
112
+
113
+
## 1.4.38.0
114
+
### Release status
115
+
12/9/2019: Release for download. Not available through auto-upgrade.
116
+
### New features and improvements
117
+
- We updated Password Hash Sync for Azure AD Domain Services to properly account for padding in Kerberos hashes. This will provide a performance improvement during password synchronization from Azure AD to Azure AD Domain Services.
118
+
- We added support for reliable sessions between the authentication agent and service bus.
119
+
- We added a DNS cache for websocket connections between authentication agent and cloud services.
120
+
- We added the ability to target specific agent from cloud to test for agent connectivity.
121
+
122
+
### Fixed issues
123
+
- Release 1.4.18.0 had a bug where the PowerShell cmdlet for DSSO was using the login Windows credentials instead of the admin credentials provided while running ps. As a result of which it was not possible to enable DSSO in multiple forest through the Azure AD Connect user interface.
124
+
- A fix was made to enable DSSO simultaneously in all forest through the Azure AD Connect user interface
125
+
126
+
## 1.4.32.0
127
+
### Release status
128
+
11/08/2019: Released for download. Not available through auto-upgrade.
129
+
130
+
>[!IMPORTANT]
131
+
>Due to an internal schema change in this release of Azure AD Connect, if you manage AD FS trust relationship configuration settings using MSOnline PowerShell then you must update your MSOnline PowerShell module to version 1.1.183.57 or higher
132
+
133
+
### Fixed issues
134
+
135
+
This version fixes an issue with existing Hybrid Azure AD joined devices. This release contains a new device sync rule that corrects this issue.
136
+
Note that this rule change may cause deletion of obsolete devices from Azure AD. This is not a cause for concern, as these device objects are not used by Azure AD during Conditional Access authorization. For some customers, the number of devices that will be deleted through this rule change can exceed the deletion threshold. If you see the deletion of device objects in Azure AD exceeding the Export Deletion Threshold, it is advised to allow the deletions to go through. [How to allow deletes to flow when they exceed the deletion threshold](how-to-connect-sync-feature-prevent-accidental-deletes.md)
137
+
138
+
## 1.4.25.0
139
+
140
+
### Release status
141
+
9/28/2019: Released for auto-upgrade to select tenants. Not available for download.
142
+
143
+
This version fixes a bug where some servers that were auto-upgraded from a previous version to 1.4.18.0 and experienced issues with Self-service password reset (SSPR) and Password Writeback.
144
+
145
+
### Fixed issues
146
+
147
+
Under certain circumstances, servers that were auto upgraded to version 1.4.18.0 did not re-enable Self-service password reset and Password Writeback after the upgrade was completed. This auto upgrade release fixes that issue and re-enables Self-service password reset and Password Writeback.
148
+
149
+
We fixed a bug in the sync errors compression utility that was not handling surrogate characters correctly.
150
+
151
+
## 1.4.18.0
152
+
153
+
>[!WARNING]
154
+
>We are investigating an incident where some customers are experiencing an issue with existing Hybrid Azure AD joined devices after upgrading to this version of Azure AD Connect. We advise customers who have deployed Hybrid Azure AD join to postpone upgrading to this version until the root cause of these issues are fully understood and mitigated. More information will be provided as soon as possible.
155
+
156
+
>[!IMPORTANT]
157
+
>With this version of Azure AD Connect some customers may see some or all of their Windows devices disappear from Azure AD. This is not a cause for concern, as these device identities are not used by Azure AD during Conditional Access authorization. For more information see [Understanding Azure AD Connect 1.4.xx.x device disappearnce](/troubleshoot/azure/active-directory/reference-connect-device-disappearance)
158
+
159
+
160
+
### Release status
161
+
9/25/2019: Released for auto-upgrade only.
162
+
163
+
### New features and improvements
164
+
- New troubleshooting tooling helps troubleshoot "user not syncing", "group not syncing" or "group member not syncing" scenarios.
165
+
- Add support for national clouds in Azure AD Connect troubleshooting script.
166
+
- Customers should be informed that the deprecated WMI endpoints for MIIS_Service have now been removed. Any WMI operations should now be done via PS cmdlets.
167
+
- Security improvement by resetting constrained delegation on AZUREADSSOACC object.
168
+
- When adding/editing a sync rule, if there are any attributes used in the rule that are in the connector schema but not added to the connector, the attributes automatically added to the connector. The same is true for the object type the rule affects. If anything is added to the connector, the connector will be marked for full import on the next sync cycle.
169
+
- Using an Enterprise or Domain admin as the connector account is no longer supported in new Azure AD Connect Deployments. Current Azure AD Connect deployments using an Enterprise or Domain admin as the connector account will not be affected by this release.
170
+
- In the Synchronization Manager a full sync is run on rule creation/edit/deletion. A popup will appear on any rule change notifying the user if full import or full sync is going to be run.
171
+
- Added mitigation steps for password errors to 'connectors > properties > connectivity' page.
172
+
- Added a deprecation warning for the sync service manager on the connector properties page. This warning notifies the user that changes should be made through the Azure AD Connect wizard.
173
+
- Added new error for issues with a user's password policy.
174
+
- Prevent misconfiguration of group filtering by domain and OU filters. Group filtering will show an error when the domain/OU of the entered group is already filtered out and keep the user from moving forward until the issue is resolved.
175
+
- Users can no longer create a connector for Active Directory Domain Services or Windows Azure Active Directory in the Synchronization Service Manager UI.
176
+
- Fixed accessibility of custom UI controls in the Synchronization Service Manager.
177
+
- Enabled six federation management tasks for all sign-in methods in Azure AD Connect. (Previously, only the "Update AD FS TLS/SSL certificate" task was available for all sign-ins.)
178
+
- Added a warning when changing the sign-in method from federation to PHS or PTA that all Azure AD domains and users will be converted to managed authentication.
179
+
- Removed token-signing certificates from the "Reset Azure AD and AD FS trust" task and added a separate sub-task to update these certificates.
180
+
- Added a new federation management task called "Manage certificates" which has sub-tasks to update the TLS or token-signing certificates for the AD FS farm.
181
+
- Added a new federation management sub-task called "Specify primary server" which allows administrators to specify a new primary server for the AD FS farm.
182
+
- Added a new federation management task called "Manage servers" which has sub-tasks to deploy an AD FS server, deploy a Web Application Proxy server, and specify primary server.
183
+
- Added a new federation management task called "View federation configuration" that displays the current AD FS settings. (Because of this addition, AD FS settings have been removed from the "Review your solution" page.)
184
+
185
+
### Fixed issues
186
+
- Resolved sync error issue for the scenario where a user object taking over its corresponding contact object has a self-reference (e.g. user is their own manager).
187
+
- Help popups now show on keyboard focus.
188
+
- For Auto upgrade, if any conflicting app is running from 6 hours, kill it and continue with upgrade.
189
+
- Limit the number of attributes a customer can select to 100 per object when selecting directory extensions. This will prevent the error from occurring during export as Azure has a maximum of 100 extension attributes per object.
190
+
- Fixed a bug to make the AD Connectivity script more robust.
191
+
- Fixed a bug to make Azure AD Connect install on a machine using an existing Named Pipes WCF service more robust.
192
+
- Improved diagnostics and troubleshooting around group policies that do not allow the ADSync service to start when initially installed.
193
+
- Fixed a bug where display name for a Windows computer was written incorrectly.
194
+
- Fix a bug where OS type for a Windows computer was written incorrectly.
195
+
- Fixed a bug where non-Windows 10 computers were syncing unexpectedly. Note that the effect of this change is that non-Windows-10 computers that were previously synced will now be deleted. This does not affect any features as the sync of Windows computers is only used for Hybrid Azure AD domain join, which only works for Windows-10 devices.
196
+
- Added several new (internal) cmdlets to the ADSync PowerShell module.
197
+
198
+
## 1.3.21.0
199
+
>[!IMPORTANT]
200
+
>There is a known issue with upgrading Azure AD Connect from an earlier version to 1.3.21.0 where the Microsoft 365 portal does not reflect the updated version even though Azure AD Connect upgraded successfully.
201
+
>
202
+
> To resolve this, you need to import the **AdSync** module and then run the `Set-ADSyncDirSyncConfiguration` PowerShell cmdlet on the Azure AD Connect server. You can use the following steps:
203
+
>
204
+
>1. Open PowerShell in administrator mode.
205
+
>2. Run `Import-Module "ADSync"`.
206
+
>3. Run `Set-ADSyncDirSyncConfiguration -AnchorAttribute ""`.
207
+
208
+
### Release status
209
+
210
+
05/14/2019: Released for download
211
+
212
+
### Fixed issues
213
+
214
+
- Fixed an elevation of privilege vulnerability that exists in Microsoft Azure Active Directory Connect build 1.3.20.0. This vulnerability, under certain conditions, may allow an attacker to execute two PowerShell cmdlets in the context of a privileged account, and perform privileged actions. This security update addresses the issue by disabling these cmdlets. For more information see [security update](https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2019-1000).
0 commit comments