Skip to content

Commit 2345e92

Browse files
Merge pull request #225879 from OWinfreyATL/owinfreyATL-WhatsNewUpdate
july partial whats new move
2 parents cc0bcc9 + a896838 commit 2345e92

File tree

1 file changed

+1
-88
lines changed

1 file changed

+1
-88
lines changed

articles/active-directory/fundamentals/whats-new.md

Lines changed: 1 addition & 88 deletions
Original file line numberDiff line numberDiff line change
@@ -1229,91 +1229,4 @@ A new Azure AD Connect release fixes several bugs and includes new functionality
12291229
Cross-tenant access settings enable you to control how users in your organization collaborate with members of external Azure AD organizations. Now you’ll have granular inbound and outbound access control settings that work on a per org, user, group, and application basis. These settings also make it possible for you to trust security claims from external Azure AD organizations like multi-factor authentication (MFA), device compliance, and hybrid Azure AD joined devices. For more information, see: [Cross-tenant access with Azure AD External Identities](../external-identities/cross-tenant-access-overview.md).
12301230

12311231

1232-
---
1233-
1234-
1235-
### General Availability- Expression builder with Application Provisioning
1236-
1237-
**Type:** Changed feature
1238-
**Service category:** Provisioning
1239-
**Product capability:** Outbound to SaaS Applications
1240-
1241-
1242-
Accidental deletion of users in your apps or in your on-premises directory could be disastrous. We’re excited to announce the general availability of the accidental deletions prevention capability. When a provisioning job would cause a spike in deletions, it will first pause and provide you visibility into the potential deletions. You can then accept or reject the deletions and have time to update the job’s scope if necessary. For more information, see [Understand how expression builder in Application Provisioning works](../app-provisioning/expression-builder.md).
1243-
1244-
1245-
---
1246-
1247-
1248-
1249-
### Public Preview - Improved app discovery view for My Apps portal
1250-
1251-
**Type:** Changed feature
1252-
**Service category:** My Apps
1253-
**Product capability:** End User Experiences
1254-
1255-
1256-
An improved app discovery view for My Apps is in public preview. The preview shows users more apps in the same space and allows them to scroll between collections. It doesn't currently support drag-and-drop and list view. Users can opt into the preview by selecting Try the preview and opt out by selecting Return to previous view. To learn more about My Apps, see [My Apps portal overview](../manage-apps/myapps-overview.md).
1257-
1258-
1259-
1260-
1261-
---
1262-
1263-
1264-
1265-
### Public Preview - New Azure AD Portal All Devices list
1266-
1267-
**Type:** Changed feature
1268-
**Service category:** Device Registration and Management
1269-
**Product capability:** End User Experiences
1270-
1271-
1272-
1273-
We're enhancing the All Devices list in the Azure AD Portal to make it easier to filter and manage your devices. Improvements include:
1274-
1275-
All Devices List:
1276-
1277-
- Infinite scrolling
1278-
- More devices properties can be filtered on
1279-
- Columns can be reordered via drag and drop
1280-
- Select all devices
1281-
1282-
For more information, see: [Manage devices in Azure AD using the Azure portal](../devices/device-management-azure-portal.md#view-and-filter-your-devices-preview).
1283-
1284-
1285-
1286-
1287-
---
1288-
1289-
1290-
1291-
### Public Preview - ADFS to Azure AD: Persistent NameID for IDP-initiated Apps
1292-
1293-
**Type:** Changed feature
1294-
**Service category:** Enterprise Apps
1295-
**Product capability:** SSO
1296-
1297-
1298-
Previously the only way to have persistent NameID value was to ​configure user attribute with an empty value. Admins can now explicitly configure the NameID value to be persistent ​along with the corresponding format.
1299-
1300-
For more information, see: [Customize app SAML token claims - Microsoft identity platform | Microsoft Docs](../develop/active-directory-saml-claims-customization.md#attributes).
1301-
1302-
1303-
---
1304-
1305-
1306-
1307-
### Public Preview - ADFS to Azure Active Directory: Customize attrname-format​
1308-
1309-
**Type:** Changed feature
1310-
**Service category:** Enterprise Apps
1311-
**Product capability:** SSO
1312-
1313-
1314-
With this new parity update, customers can now integrate non-gallery applications such as Socure DevHub with Azure AD to have SSO via SAML.
1315-
1316-
For more information, see [Claims mapping policy - Microsoft Entra | Microsoft Docs](../develop/reference-claims-mapping-policy-type.md#claim-schema-entry-elements).
1317-
1318-
1319-
---
1232+
---

0 commit comments

Comments
 (0)