You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/fundamentals/whats-new.md
+1-88Lines changed: 1 addition & 88 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1229,91 +1229,4 @@ A new Azure AD Connect release fixes several bugs and includes new functionality
1229
1229
Cross-tenant access settings enable you to control how users in your organization collaborate with members of external Azure AD organizations. Now you’ll have granular inbound and outbound access control settings that work on a per org, user, group, and application basis. These settings also make it possible for you to trust security claims from external Azure AD organizations like multi-factor authentication (MFA), device compliance, and hybrid Azure AD joined devices. For more information, see: [Cross-tenant access with Azure AD External Identities](../external-identities/cross-tenant-access-overview.md).
1230
1230
1231
1231
1232
-
---
1233
-
1234
-
1235
-
### General Availability- Expression builder with Application Provisioning
1236
-
1237
-
**Type:** Changed feature
1238
-
**Service category:** Provisioning
1239
-
**Product capability:** Outbound to SaaS Applications
1240
-
1241
-
1242
-
Accidental deletion of users in your apps or in your on-premises directory could be disastrous. We’re excited to announce the general availability of the accidental deletions prevention capability. When a provisioning job would cause a spike in deletions, it will first pause and provide you visibility into the potential deletions. You can then accept or reject the deletions and have time to update the job’s scope if necessary. For more information, see [Understand how expression builder in Application Provisioning works](../app-provisioning/expression-builder.md).
1243
-
1244
-
1245
-
---
1246
-
1247
-
1248
-
1249
-
### Public Preview - Improved app discovery view for My Apps portal
1250
-
1251
-
**Type:** Changed feature
1252
-
**Service category:** My Apps
1253
-
**Product capability:** End User Experiences
1254
-
1255
-
1256
-
An improved app discovery view for My Apps is in public preview. The preview shows users more apps in the same space and allows them to scroll between collections. It doesn't currently support drag-and-drop and list view. Users can opt into the preview by selecting Try the preview and opt out by selecting Return to previous view. To learn more about My Apps, see [My Apps portal overview](../manage-apps/myapps-overview.md).
1257
-
1258
-
1259
-
1260
-
1261
-
---
1262
-
1263
-
1264
-
1265
-
### Public Preview - New Azure AD Portal All Devices list
1266
-
1267
-
**Type:** Changed feature
1268
-
**Service category:** Device Registration and Management
1269
-
**Product capability:** End User Experiences
1270
-
1271
-
1272
-
1273
-
We're enhancing the All Devices list in the Azure AD Portal to make it easier to filter and manage your devices. Improvements include:
1274
-
1275
-
All Devices List:
1276
-
1277
-
- Infinite scrolling
1278
-
- More devices properties can be filtered on
1279
-
- Columns can be reordered via drag and drop
1280
-
- Select all devices
1281
-
1282
-
For more information, see: [Manage devices in Azure AD using the Azure portal](../devices/device-management-azure-portal.md#view-and-filter-your-devices-preview).
1283
-
1284
-
1285
-
1286
-
1287
-
---
1288
-
1289
-
1290
-
1291
-
### Public Preview - ADFS to Azure AD: Persistent NameID for IDP-initiated Apps
1292
-
1293
-
**Type:** Changed feature
1294
-
**Service category:** Enterprise Apps
1295
-
**Product capability:** SSO
1296
-
1297
-
1298
-
Previously the only way to have persistent NameID value was to configure user attribute with an empty value. Admins can now explicitly configure the NameID value to be persistent along with the corresponding format.
1299
-
1300
-
For more information, see: [Customize app SAML token claims - Microsoft identity platform | Microsoft Docs](../develop/active-directory-saml-claims-customization.md#attributes).
1301
-
1302
-
1303
-
---
1304
-
1305
-
1306
-
1307
-
### Public Preview - ADFS to Azure Active Directory: Customize attrname-format
1308
-
1309
-
**Type:** Changed feature
1310
-
**Service category:** Enterprise Apps
1311
-
**Product capability:** SSO
1312
-
1313
-
1314
-
With this new parity update, customers can now integrate non-gallery applications such as Socure DevHub with Azure AD to have SSO via SAML.
1315
-
1316
-
For more information, see [Claims mapping policy - Microsoft Entra | Microsoft Docs](../develop/reference-claims-mapping-policy-type.md#claim-schema-entry-elements).
0 commit comments