You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new-archive.md
-179Lines changed: 0 additions & 179 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7485,191 +7485,12 @@ For more information, see [Getting started with the Azure Active Directory Multi
7485
7485
7486
7486
---
7487
7487
7488
-
## May 2019
7489
7488
7490
-
### Service change: Future support for only TLS 1.2 protocols on the Application Proxy service
7491
7489
7492
-
**Type:** Plan for change
7493
-
**Service category:** App Proxy
7494
-
**Product capability:** Access Control
7495
-
7496
-
To help provide best-in-class encryption for our customers, we're limiting access to only TLS 1.2 protocols on the Application Proxy service. This change is gradually being rolled out to customers who are already only using TLS 1.2 protocols, so you shouldn't see any changes.
7497
-
7498
-
Deprecation of TLS 1.0 and TLS 1.1 happens on August 31, 2019, but we'll provide additional advanced notice, so you'll have time to prepare for this change. To prepare for this change make sure your client-server and browser-server combinations, including any clients your users use to access apps published through Application Proxy, are updated to use the TLS 1.2 protocol to maintain the connection to the Application Proxy service. For more information, see [Add an on-premises application for remote access through Application Proxy in Azure Active Directory](../app-proxy/application-proxy-add-on-premises-application.md#prerequisites).
7499
-
7500
-
---
7501
-
7502
-
### Use the usage and insights report to view your app-related sign-in data
7503
-
7504
-
**Type:** New feature
7505
-
**Service category:** Enterprise Apps
7506
-
**Product capability:** Monitoring & Reporting
7507
-
7508
-
You can now use the usage and insights report, located in the **Enterprise applications** area of the Azure portal, to get an application-centric view of your sign-in data, including info about:
7509
-
7510
-
- Top used apps for your organization
7511
-
7512
-
- Apps with the most failed sign-ins
7513
-
7514
-
- Top sign-in errors for each app
7515
-
7516
-
For more information about this feature, see [Usage and insights report in the Azure portal](../reports-monitoring/concept-usage-insights-report.md)
7517
-
7518
-
---
7519
-
7520
-
### Automate your user provisioning to cloud apps using Azure AD
7521
-
7522
-
**Type:** New feature
7523
-
**Service category:** Enterprise Apps
7524
-
**Product capability:** Monitoring & Reporting
7525
-
7526
-
Follow these new tutorials to use the Azure AD Provisioning Service to automate the creation, deletion, and updating of user accounts for the following cloud-based apps:
You can also follow this new [Dropbox tutorial](../saas-apps/dropboxforbusiness-provisioning-tutorial.md), which provides info about how to provision group objects.
7535
-
7536
-
For more information about how to better secure your organization through automated user account provisioning, see [Automate user provisioning to SaaS applications with Azure AD](../app-provisioning/user-provisioning.md).
7537
-
7538
-
---
7539
-
7540
-
### Identity secure score is now available in Azure AD (General availability)
You can now monitor and improve your identity security posture by using the identity secure score feature in Azure AD. The identity secure score feature uses a single dashboard to help you:
7547
-
7548
-
- Objectively measure your identity security posture, based on a score between 1 and 223.
7549
-
7550
-
- Plan for your identity security improvements
7551
-
7552
-
- Review the success of your security improvements
7553
-
7554
-
For more information about the identity security score feature, see [What is the identity secure score in Azure Active Directory?](./identity-secure-score.md).
7555
-
7556
-
---
7557
-
7558
-
### New App registrations experience is now available (General availability)
7559
-
7560
-
**Type:** New feature
7561
-
**Service category:** Authentications (Logins)
7562
-
**Product capability:** Developer Experience
7563
-
7564
-
The new [App registrations](https://aka.ms/appregistrations) experience is now in general availability. This new experience includes all the key features you're familiar with from the Azure portal and the Application Registration portal and improves upon them through:
7565
-
7566
-
-**Better app management.** Instead of seeing your apps across different portals, you can now see all your apps in one location.
7567
-
7568
-
-**Simplified app registration.** From the improved navigation experience to the revamped permission selection experience, it's now easier to register and manage your apps.
7569
-
7570
-
-**More detailed information.** You can find more details about your app, including quickstart guides and more.
7571
-
7572
-
For more information, see [Microsoft identity platform](../develop/index.yml) and the [App registrations experience is now generally available!](https://developer.microsoft.com/identity/blogs/new-app-registrations-experience-is-now-generally-available/) blog announcement.
7573
-
7574
-
---
7575
-
7576
-
### New capabilities available in the Risky Users API for Identity Protection
We're pleased to announce that you can now use the Risky Users API to retrieve users' risk history, dismiss risky users, and to confirm users as compromised. This change helps you to more efficiently update the risk status of your users and understand their risk history.
7583
-
7584
-
For more information, see the [Risky Users API reference documentation](/graph/api/resources/riskyuser).
7585
-
7586
-
---
7587
-
7588
-
### New Federated Apps available in Azure AD app gallery - May 2019
7589
-
7590
-
**Type:** New feature
7591
-
**Service category:** Enterprise Apps
7592
-
**Product capability:** 3rd Party Integration
7593
-
7594
-
In May 2019, we've added these 21 new apps with Federation support to the app gallery:
For more information about the apps, see [SaaS application integration with Azure Active Directory](../saas-apps/tutorial-list.md). For more information about listing your application in the Azure AD app gallery, see [List your application in the Azure Active Directory application gallery](../manage-apps/v2-howto-app-gallery-listing.md).
7599
-
7600
-
---
7601
-
7602
-
### Improved groups creation and management experiences in the Azure portal
7603
-
7604
-
**Type:** New feature
7605
-
**Service category:** Group Management
7606
-
**Product capability:** Collaboration
7607
-
7608
-
We've made improvements to the groups-related experiences in the Azure portal. These improvements allow administrators to better manage groups lists, members lists, and to provide additional creation options.
7609
-
7610
-
Improvements include:
7611
-
7612
-
- Basic filtering by membership type and group type.
7613
-
7614
-
- Addition of new columns, such as Source and Email address.
7615
-
7616
-
- Ability to multi-select groups, members, and owner lists for easy deletion.
7617
-
7618
-
- Ability to choose an email address and add owners during group creation.
7619
-
7620
-
For more information, see [Create a basic group and add members using Azure Active Directory](./active-directory-groups-create-azure-portal.md).
7621
-
7622
-
---
7623
7490
7624
-
### Configure a naming policy for Office 365 groups in Azure portal (General availability)
7625
7491
7626
-
**Type:** Changed feature
7627
-
**Service category:** Group Management
7628
-
**Product capability:** Collaboration
7629
-
7630
-
Administrators can now configure a naming policy for Office 365 groups, using the Azure portal. This change helps to enforce consistent naming conventions for Office 365 groups created or edited by users in your organization.
7631
-
7632
-
You can configure naming policy for Office 365 groups in two different ways:
7633
-
7634
-
- Define prefixes or suffixes, which are automatically added to a group name.
7635
-
7636
-
- Upload a customized set of blocked words for your organization, which aren't allowed in group names (for example, "CEO, Payroll, HR").
7637
-
7638
-
For more information, see [Enforce a Naming Policy for Office 365 groups](../enterprise-users/groups-naming-policy.md).
7639
-
7640
-
---
7641
-
7642
-
### Microsoft Graph API endpoints are now available for Azure AD activity logs (General availability)
7643
-
7644
-
**Type:** Changed feature
7645
-
**Service category:** Reporting
7646
-
**Product capability:** Monitoring & Reporting
7647
7492
7648
-
We're happy to announce general availability of Microsoft Graph API endpoints support for Azure AD activity logs. With this release, you can now use Version 1.0 of both the Azure AD audit logs, as well as the sign-in logs APIs.
7649
7493
7650
-
For more information, see [Azure AD audit log API overview](/graph/api/resources/azure-ad-auditlog-overview).
7651
-
7652
-
---
7653
-
7654
-
### Administrators can now use Conditional Access for the combined registration process (Public preview)
Administrators can now create Conditional Access policies for use by the combined registration page. This includes applying policies to allow registration if:
7661
-
7662
-
- Users are on a trusted network.
7663
-
7664
-
- Users are a low sign-in risk.
7665
-
7666
-
- Users are on a managed device.
7667
-
7668
-
- Users agree to the organization's terms of use (TOU).
7669
-
7670
-
For more information about Conditional Access and password reset, you can see the [Conditional Access for the Azure AD combined MFA and password reset registration experience blog post](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Conditional-access-for-the-Azure-AD-combined-MFA-and-password/ba-p/566348). For more information about Conditional Access policies for the combined registration process, see [Conditional Access policies for combined registration](../authentication/howto-registration-mfa-sspr-combined.md#conditional-access-policies-for-combined-registration). For more information about the Azure AD terms of use feature, see [Azure Active Directory terms of use feature](../conditional-access/terms-of-use.md).
0 commit comments